Description

Book Synopsis

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn''t, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier''s tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community.

Praise for Secrets and Lies

This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That''s why Secrets and Lies belongs in every manager''s library.-Business Week

Startlingly lively....a jewel box of little surprises you can actually use.-Fortune

Se

Table of Contents

Foreword to 2015

15th Anniversary Edition ix

Introduction From the Paperback Edition xiii

Preface xxiii

About the Author xxvii

1. Introduction 1

Part 1: The Landscape 11

2. Digital Threats 14

3. Attacks 23

4. Adversaries 42

5. Security Needs 59

Part 2: Technologies 83

6. Cryptography 85

7. Cryptography in Context 102

8. Computer Security 120

9. Identification and Authentication 135

10. Networked-Computer Security 151

11. Network Security 176

12. Network Defenses 188

13. Software Reliability 202

14. Secure Hardware 212

15. Certificates and Credentials 225

16. Security Tricks 240

17. The Human Factor 255

Part 3: Strategies 271

18. Vulnerabilities and the Vulnerability Landscape 274

19. Threat Modeling and Risk Assessment 288

20. Security Policies and Countermeasures 307

21. Attack Trees 318

22. Product Testing and Verification 334

23. The Future of Products 353

24. Security Processes 367

25. Conclusion 389

Afterword 396

Resources 399

Acknowledgments 401

Index 403

Secrets and Lies

Product form

£19.20

Includes FREE delivery

RRP £24.00 – you save £4.80 (20%)

Order before 4pm today for delivery by Mon 19 Jan 2026.

A Hardback by Bruce Schneier

15 in stock


    View other formats and editions of Secrets and Lies by Bruce Schneier

    Publisher: John Wiley & Sons Inc
    Publication Date: 24/04/2015
    ISBN13: 9781119092438, 978-1119092438
    ISBN10: 1119092434

    Description

    Book Synopsis

    This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn''t, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier''s tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community.

    Praise for Secrets and Lies

    This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That''s why Secrets and Lies belongs in every manager''s library.-Business Week

    Startlingly lively....a jewel box of little surprises you can actually use.-Fortune

    Se

    Table of Contents

    Foreword to 2015

    15th Anniversary Edition ix

    Introduction From the Paperback Edition xiii

    Preface xxiii

    About the Author xxvii

    1. Introduction 1

    Part 1: The Landscape 11

    2. Digital Threats 14

    3. Attacks 23

    4. Adversaries 42

    5. Security Needs 59

    Part 2: Technologies 83

    6. Cryptography 85

    7. Cryptography in Context 102

    8. Computer Security 120

    9. Identification and Authentication 135

    10. Networked-Computer Security 151

    11. Network Security 176

    12. Network Defenses 188

    13. Software Reliability 202

    14. Secure Hardware 212

    15. Certificates and Credentials 225

    16. Security Tricks 240

    17. The Human Factor 255

    Part 3: Strategies 271

    18. Vulnerabilities and the Vulnerability Landscape 274

    19. Threat Modeling and Risk Assessment 288

    20. Security Policies and Countermeasures 307

    21. Attack Trees 318

    22. Product Testing and Verification 334

    23. The Future of Products 353

    24. Security Processes 367

    25. Conclusion 389

    Afterword 396

    Resources 399

    Acknowledgments 401

    Index 403

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account