Secrets and Lies: Digital Security in a Networked World et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Secrets and Lies: Digital... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par Britbooksfr
État: D'occasion: Bon
Commentaire: Simplement Brit: Nous avons envoyé dans nos livres d'entrepôts britanniques du bon état de plus de 1 million de clients satisfaits à travers le monde. nous nous engageons à vous fournir un service fiable et efficace à tout moment.
Amazon rachète votre
article EUR 0,79 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Secrets and Lies: Digital Security in a Networked World (Anglais) Broché – 23 janvier 2004


Voir les 3 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Relié
"Veuillez réessayer"
EUR 43,24 EUR 2,27
Broché
"Veuillez réessayer"
EUR 12,52
EUR 7,96 EUR 0,78

Produits fréquemment achetés ensemble

Secrets and Lies: Digital Security in a Networked World + Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Prix pour les deux : EUR 31,42

Acheter les articles sélectionnés ensemble

Descriptions du produit

Revue de presse

The security technologies available are described ina user–friendly way without going into depth... ( ComputerBulletin, January 2005)

peppered with lively anecdotes and aphorisms,making it a really accessible read... (The ISSGMagazine, Autumn, 2004)

fascinating read peppered with livelyanecdotes (The ISSG Magazine, October2004)

"...make yourself better informed. Read this book." (CVu, TheJournal of the ACCU, Vol 16(3), June 2004)

Présentation de l'éditeur

Bestselling author Bruce Schneier offers his expert guidance onachieving security on a network
Internationally recognized computer security expert Bruce Schneieroffers a practical, straightforward guide to achieving securitythroughout computer networks. Schneier uses his extensive fieldexperience with his own clients to dispel the myths that oftenmislead IT managers as they try to build secure systems. Thispractical guide provides readers with a better understanding of whyprotecting information is harder in the digital world, what theyneed to know to protect digital information, how to assess businessand corporate security needs, and much more.
∗ Walks the reader through the real choices they have now fordigital security and how to pick and choose the right one to meettheir business needs
∗ Explains what cryptography can and can′t do in achieving digitalsecurity


Vendez cet article - Prix de rachat jusqu'à EUR 0,79
Vendez Secrets and Lies: Digital Security in a Networked World contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 0,79, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit

  • Broché: 448 pages
  • Editeur : John Wiley & Sons; Édition : 1 (23 janvier 2004)
  • Langue : Anglais
  • ISBN-10: 0471453803
  • ISBN-13: 978-0471453802
  • Dimensions du produit: 15,2 x 3 x 22,9 cm
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (3 commentaires client)
  • Classement des meilleures ventes d'Amazon: 73.444 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  • Table des matières complète
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
3
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
Voir les 3 commentaires client
Partagez votre opinion avec les autres clients

Commentaires client les plus utiles

Format: Broché
C'est un Bruce Schneier un rien désabusé qui s'interroge dans ce livre sur les enjeux de la sécurité sur Internet.

Bruce Schneier s'était avant cela fait connaitre comme un grand expert en cryptographie, auteur, notamment, du classique "Applied Cryptography". Dans Secrets & Lies, il reconnait que la cryptographie en soi ne résoud pas tous les problèmes de sécurité, loin de là, et qu'il reste encore beaucoup à faire pour recréer un climat de confiance sur Internet.

B. Schneier aborde et traite la question de la confiance numérique sous un angle "philosophique" et non technique, l'ouvrage est donc à mettre dans toutes les mains.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Par Erwan Legrand le 19 février 2006
Format: Relié
Secrets and Lies est un excellent livre traitant de façon globale de la sécurité de l'information. Il ne s'agit en aucun cas d'un ouvrage technique. Le texte est très facilement abordable et rédigé de façon très claire. Le spécialiste du domaine devrait y trouver son compte tout autant que le néophyte. Probablement le meilleur texte qu'il m'ait été donné de lire sur le sujet.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Par Alain Ninane le 6 octobre 2013
Format: Format Kindle Achat vérifié
Même si ce livre date un peu, il est toujours d'actualité. Je l'avais déjà lu en version papier lors de sa sortie ; un plaisir de le relire en numérique.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 143 commentaires
127 internautes sur 134 ont trouvé ce commentaire utile 
A must-read for true computer security professionals 30 octobre 2000
Par Richard Bejtlich - Publié sur Amazon.com
Format: Relié
I am an Air Force officer and technical resource for a 50-person military intrusion detection operation. I've seen Bruce speak twice and he never fails to impress. "Secrets and Lies" is no different. This book is not designed to teach readers about the latest security technologies. It was not written to promote specific products, although Bruce explains how the book's themes caused him to revamp his Counterpane firm. What the book does is teach security professionals how to think about their craft. I would recommend it to everyone in the field from day one, but its deeper meanings would probably not be evident until a year's work on the front lines.
Some of the ideas aren't new. For example, I've heard members of the L0pht petition for a software Underwriter's Lab for years, and others have encouraged liability laws for software vendors. Bruce builds on these ideas and weaves them into his own prescription for dealing with complex and inherently insecure systems. This is the type of book that gives a professional the vocabulary and framework to organize his understanding of the security process. "Secrets and Lies" creates the "little voice" that warns against a vendor's promises to solve all your problems with a $30,000 box-of-wonders.
Of particular interest to me, after training in economics, is Bruce's insistence that "the buying public has no way to differentiate real security from bad security." It logicially follows that the market cannot address this problem, since "perfect information" does not exist. Therefore, outside organizations (perhaps an FDA for software?) should get involved, but not by outlawing reverse engineering and security tools.
I give five stars to books that make the complex simple, that reveal and enhance technical details, or that change the way I look at the world. This book fits two, and possibly three of those categories. Bravo, Bruce.
85 internautes sur 91 ont trouvé ce commentaire utile 
Excellent intro infosec book that everyone should read 18 septembre 2000
Par J. G. Heiser - Publié sur Amazon.com
Format: Relié Achat vérifié
Written by one of my favorite industry commentators, this is an introductory text on information security that should be useful to just about everyone. I highly recommend this book for the following audiences:
· Beginning security specialists
· IS and other business managers who make decisions about systems deployment
· Experienced security practitioners who want to improve their thinking and analysis skills
· Those studying for security certification, such as the CISSP
· Software and Internet product planning and marketing staff (and not just security software)
Schneier, who is recognized for his contributions to cryptography, has recently found religion. As recounted in a recent interview in "Information Security" magazine, he realized that humans were destroying the purity of his mathematical approach. Instead of retreating into academia, he tackled this issue head-on, some of the result of which is this landmark book. He recommends reading it cover to cover, and I agree with him-it takes all 400 pages to paint the complete story, and if you don't approach it linearly, you run the risk of missing the subtleties of the author's message. Skimming this book could easily trap a reader into equating vulnerability with risk. The world is full of risk, and while Schneier takes obvious delight in deconstructing the vulnerabilities of automated systems, it is important to understand that historical manual systems are quite vulnerable too, and humans deal with the risk quite nicely. Read the whole book.
The chapters that I found most significant included:
· (6 & 7) Cryptography: It is no surprise that he was written a terrific introduction to the concepts and building blocks (primitives and protocols) of encryption. Even techno-agnostics will find great value in his discussion of the problems with proprietary algorithms.
· (9) Identification & Authentication: An excellent introduction to the problems of passwords and helpful discussion of the limitations of biometrics. He makes it clear why biometrics are NOT a magic cure for security problems.
· (12) Network Defenses: Schneier tells it like it is! The ugly truth about sexy security toys.
· (13) Software Reliability: Best description of stack overflow that I've ever seen for a lay audience.
· (22) Product Testing and Verification: After crypto, evaluating software for security flaws is Schneier's other specialty, and he's written an awesome chapter. The author makes it very clear why it is unrealistic to expect invulnerable software, he single-handedly conducts a totally balanced debate on the merits of full disclosure, and he finishes the chapter with sage advice on approaching security product reviews with healthy skepticism.
I'm often asked to recommend introductory texts on information security, and unfortunately there really aren't that many good books for a newbie. If more books existed, I would probably give Schneier's book a 4 instead of a 5, but for now, this is one of the best. As he explains in the Afterward, his `epiphany' occurred only 12 months before completing the text-this isn't much time to become an expert in security process. His background is somewhat removed from day to day operations, and perhaps this lack of administrative experience results in a few weak areas. I suggest that the reader exercise some critical thinking and consult additional authorities when reading the following chapters:
· (4) Adversaries: his concept of computer criminals is a bit weak, pretty much lumping all transgressors into the mutually exclusive categories of `spy' or `hacker'.
· (5) Security Needs: Sof of his terminology lacks precision (perhaps inevitable when addressing a general audience). I disagree that a spoofed message represents an integrity failure, and I don't characterize audit as a requirement, but as a control.
· (15) Certificates and Credentials: He totally ignores the concept that practice statements (policies on CA and especially certificate management) provide any arbitrary level of assurance-the more stringent the rules, the higher the assurance. He doesn't discuss time stamping and other forms of third-party witnessing that can greatly strengthen a digital signature.
· (16) Security Tricks: His vehement attack on key recovery is politically extreme. The government's ill-conceived desire for key escrow should not affect the responsibility a corporation has to protect its own data. Who hasn't used an encryption product and lost a key?
· (21) Attack Trees: This is a marvelously useful idea, but he leaves the impression that these can be used to create quantifiable risk models, and I don't believe that putting information security risk in dollar value terms is practical.
Despite its length, the book is a quick read, and the informal tone makes it very approachable. It is addressed at a completely different audience than "Applied Cryptography"--it isn't a technical book--it is more of a business book. (Technical specialists would be well advised to read more business texts like this.) My copy is already well marked with highlighting and notes-this text has a lot of meat in it, and many new and useful ideas. If you find this book helpful in your job and you want to do additional reading, two complementary texts on the human aspects of infosec that I recommend are "The Process of Network Security" by Thomas Wadlow, and "Fighting Computer Crime : A New Framework for Protecting Information" by Donn B. Parker (I've reviewed both here on Amazon).
41 internautes sur 42 ont trouvé ce commentaire utile 
Secrets and Lies and Schneier, oh my 6 septembre 2000
Par Un client - Publié sur Amazon.com
Format: Relié
_Secrets and Lies_ is a necessary book for everyone who wonders about privacy and security on the Internet--that is to say, everyone. Schneier discusses the threats in cyberspace, the technologies to combat them, and (most importantly) the strategies that make those technologies work. It's not surprising that the technical information is solid. What might be surprising to some, though, is how lucid and funny Schneier's writing is. He doesn't talk down to readers, but you don't have to be a complete techie to understand what he's saying.
Schneier's discussion of where things are and where they're going is fascinating and informative. I was especially interested by the legal stuff--many of the laws designed to enhance security and privacy actually damage it. Read this book, make your boss read it, make your IT manager read it, and send a copy to your congresscritter. It might just help make the Net safer.
18 internautes sur 20 ont trouvé ce commentaire utile 
Classic Schneier 21 août 2000
Par Ryan L. Russell - Publié sur Amazon.com
Format: Relié
If you're a fan of Bruce Schneier, whether it be his live presentations, his books, or Crypto-Gram, then you'll love this book. Bruce has shifted his focus away somewhat from the deep technical details that he has in "Applied Cryptography." In this book, he delves more into the hows and whys of security, and focuses heavily on the trade-offs that reality forces security people to make. This book is a must-read for anyone responsible for making security decisions.
16 internautes sur 18 ont trouvé ce commentaire utile 
goes past the technology 31 août 2000
Par Robert Halloran - Publié sur Amazon.com
Format: Relié
Bruce has rightfully earned his reputation by explaining the technology of security. In this book he goes past that by explaining that security is a system, a process, and does it in his typical style that makes it completely understandable and actually a fun read. If you're responsible for security matters, you may not like seeing various 'social engineering' hacks exposed, but it's information that you and everyone using a computer these days needs to be aware of. Once again, Bruce brings a straightforward style to bear and makes sometimes difficult subject matter clear to the reader.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?