• Complain

Bruce Schneier - Secrets and Lies: Digital Security in a Networked World

Here you can read online Bruce Schneier - Secrets and Lies: Digital Security in a Networked World full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2004, publisher: Wiley, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Secrets and Lies: Digital Security in a Networked World
  • Author:
  • Publisher:
    Wiley
  • Genre:
  • Year:
    2004
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Secrets and Lies: Digital Security in a Networked World: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Secrets and Lies: Digital Security in a Networked World" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a networkInternationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs* Explains what cryptography can and cant do in achieving digital security

Bruce Schneier: author's other books


Who wrote Secrets and Lies: Digital Security in a Networked World? Find out the surname, the name of the author of the book and a list of all author's works by series.

Secrets and Lies: Digital Security in a Networked World — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Secrets and Lies: Digital Security in a Networked World" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Praise for Secrets and Lies

Successful companies embrace risk, and Schneier shows how to bring that thinking to the Internet.

Mary Meeker, Managing Director and Internet Analyst, Morgan Stanley, Dean Witter

Bruce shows that concern for security should not rest in the IT department alone, but also in the business office... Secrets and Lies is the breakthrough text weve been waiting for to tell both sides of the story.

Steve Hunt, Vice President of Research, Giga Information Group

Good security is good business. And security is not (just) a technical issue; its a people issue! Security expert Bruce Schneier tells you why and how. If you want to be successful, you should read this book before the competition does.

Esther Dyson, Chairman, EDventure Holdings

Setting himself apart, Schneier navigates rough terrain without being overly technical or sensationaltwo common pitfalls of writers who take on cybercrime and security. All this helps to explain Schneiers long-standing cult-hero status, evenindeed especiallyamong his esteemed hacker adversaries.

Industry Standard

All in all, as a broad and readable security guide, Secrets and Lies should be near the top of the IT required-reading list.

eWeek

Secrets and Lies should begin to dispel the fog of deception and special pleading around security, and its fun.

New Scientist

This book should be, and can be, read by any business executive, no specialty in security required... At Walker Digital, we spent millions of dollars to understand what Bruce Schneier has deftly explained here.

Jay S. Walker, Founder of Priceline.com

Just as Applied Cryptography was the bible for cryptographers in the 90s, so Secrets and Lies will be the official bible for INFOSEC in the new millennium. I didnt think it was possible that a book on business security could make me laugh and smile, but Schneier has made this subject very enjoyable.

Jim Wallner, National Security Agency

The news media offer examples of our chronic computer security woes on a near-daily basis, but until now there hasnt been a clear, comprehensive guide that puts the wide range of digital threats in context. The ultimate knowledgeable insider, Schneier not only provides definitions, explanations, stories, and strategies, but a measure of hope that we can get through it all.

Steven Levy, author of Hackers and Crypto

In his newest book, Secrets and Lies:Digital Security in a Networked World, Schneier emphasizes the limitations of technology and offers managed security monitoring as the solution of the future.

Forbes Magazine

Secrets and Lies

DIGITAL SECURITY IN A NETWORKED WORLD

Bruce Schneier

Secrets and Lies Digital Security in a Networked World - image 1

Wiley Publishing, Inc.

Publisher: Robert Ipsen

Editor: Carol Long

Managing Editor: Micheline Frederick

Associate New Media Editor: Brian Snapp

Text Design and Composition: North Market Street Graphics

Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where Wiley Publishing, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration.

Copyright 2000 by Bruce Schneier. All rights reserved. Chapter 1, Introduction, copyright 2004 by Bruce Schneier. All rights reserved.

Published by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, Email: permcoordinator@wiley.com.

This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought.

Library of Congress Cataloging-in-Publication Data:

Schneier, Bruce, 1963
Secrets and lies : digital security in a networked world / Bruce Schneier.
p. cm.
Wiley Computer Publishing.
ISBN 0-471-25311-1 (cloth : alk. paper) ISBN 0-471-45380-3 (paper : alk. paper)
1. Computer security. 2. Computer networksSecurity measures. I. Title.
QA76.9.A25 S352 2000
005.8dc21 00-042252

Printed in the United States of America.

10 9 8 7 6 5 4 3 2 1

To Karen: DMASC

Preface

I have written this book partly to correct a mistake.

Seven years ago I wrote another book: Applied Cryptography. In it I described a mathematical utopia: algorithms that would keep your deepest secrets safe for millennia, protocols that could perform the most fantastical electronic interactionsunregulated gambling, undetectable authentication, anonymous cashsafely and securely. In my vision cryptography was the great technological equalizer; anyone with a cheap (and getting cheaper every year) computer could have the same security as the largest government. In the second edition of the same book, written two years later, I went so far as to write: It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics.

Its just not true. Cryptography cant do any of that.

Its not that cryptography has gotten weaker since 1994, or that the things I described in that book are no longer true; its that cryptography doesnt exist in a vacuum.

Cryptography is a branch of mathematics. And like all mathematics, it involves numbers, equations, and logic. Security, palpable security that you or I might find useful in our lives, involves people: things people know, relationships between people, people and how they relate to machines. Digital security involves computers: complex, unstable, buggy computers.

Mathematics is perfect; reality is subjective. Mathematics is defined; computers are ornery. Mathematics is logical; people are erratic, capricious, and barely comprehensible.

The error of Applied Cryptography is that I didnt talk at all about the context. I talked about cryptography as if it were The Answer. I was pretty nave.

The result wasnt pretty. Readers believed that cryptography was a kind of magic security dust that they could sprinkle over their software and make it secure. That they could invoke magic spells like 128-bit key and public-key infrastructure. A colleague once told me that the world was full of bad security systems designed by people who read Applied Cryptography.

Since writing the book, I have made a living as a cryptography consultant: designing and analyzing security systems. To my initial surprise, I found that the weak points had nothing to do with the mathematics. They were in the hardware, the software, the networks, and the people. Beautiful pieces of mathematics were made irrelevant through bad programming, a lousy operating system, or someones bad password choice. I learned to look beyond the cryptography, at the entire system, to find weaknesses. I started repeating a couple of sentiments youll find throughout this book: Security is a chain; its only as secure as the weakest link. Security is a process, not a product.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Secrets and Lies: Digital Security in a Networked World»

Look at similar books to Secrets and Lies: Digital Security in a Networked World. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Secrets and Lies: Digital Security in a Networked World»

Discussion, reviews of the book Secrets and Lies: Digital Security in a Networked World and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.