Secrets and Lies: Digital Security in a Networked World et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus

Acheter neuf

ou
Identifiez-vous pour activer la commande 1-Click.
ou
en essayant gratuitement Amazon Premium pendant 30 jours. Votre inscription aura lieu lors du passage de la commande. En savoir plus.
Acheter d'occasion
D'occasion - Bon Voir les détails
Prix : EUR 3,74

ou
 
   
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Secrets and Lies: Digital Security in a Networked World sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Secrets and Lies: Digital Security in a Networked World [Anglais] [Broché]

Bruce Schneier
5.0 étoiles sur 5  Voir tous les commentaires (3 commentaires client)
Prix : EUR 15,99 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le vendredi 22 août ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 10,99  
Relié --  
Broché EUR 15,99  

Description de l'ouvrage

23 janvier 2004
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. ∗ Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs ∗ Explains what cryptography can and can′t do in achieving digital security

Offres spéciales et liens associés


Produits fréquemment achetés ensemble

Secrets and Lies: Digital Security in a Networked World + Liars and Outliers: Enabling the Trust that Society Needs to Thrive + Beyond Fear: Thinking Sensibly About Security in an Uncertain World
Acheter les articles sélectionnés ensemble


Descriptions du produit

Revue de presse

“…The security technologies available are described in a user–friendly way without going into depth...” ( Computer Bulletin , January 2005) “…peppered with lively anecdotes and aphorisms, making it a really accessible read...” ( The ISSG Magazine , Autumn, 2004) “…fascinating read…peppered with lively anecdotes…” ( The ISSG Magazine , October 2004) "...make yourself better informed. Read this book." ( CVu, The Journal of the ACCU , Vol 16(3), June 2004)

Quatrième de couverture

"A primer in practical computer security aimed at those shopping, communicating, or doing business online – almost everyone, in other words." –The Economist Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world? The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive. "This book is of value to anyone whose business depends on safe use of e–mail, the Web, or other networked communications. If that’s not yet everybody, it soon will be." –Stephen H. Wildstrom, BusinessWeek "It’s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well." –Dustin Puryear, Linux.com "Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible." –Los Angeles Times

Détails sur le produit

  • Broché: 448 pages
  • Editeur : John Wiley & Sons (23 janvier 2004)
  • Langue : Anglais
  • ISBN-10: 0471453803
  • ISBN-13: 978-0471253112
  • Dimensions du produit: 23 x 15,5 x 3,1 cm
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (3 commentaires client)
  • Classement des meilleures ventes d'Amazon: 81.704 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  • Table des matières complète
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?


Commentaires en ligne 

4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
5.0 étoiles sur 5 Merveilleux ! 6 octobre 2013
Format:Format Kindle|Achat vérifié
Même si ce livre date un peu, il est toujours d'actualité. Je l'avais déjà lu en version papier lors de sa sortie ; un plaisir de le relire en numérique.
Avez-vous trouvé ce commentaire utile ?
5.0 étoiles sur 5 A qui faire confiance ? 24 août 2006
Format:Broché
C'est un Bruce Schneier un rien désabusé qui s'interroge dans ce livre sur les enjeux de la sécurité sur Internet.

Bruce Schneier s'était avant cela fait connaitre comme un grand expert en cryptographie, auteur, notamment, du classique "Applied Cryptography". Dans Secrets & Lies, il reconnait que la cryptographie en soi ne résoud pas tous les problèmes de sécurité, loin de là, et qu'il reste encore beaucoup à faire pour recréer un climat de confiance sur Internet.

B. Schneier aborde et traite la question de la confiance numérique sous un angle "philosophique" et non technique, l'ouvrage est donc à mettre dans toutes les mains.
Avez-vous trouvé ce commentaire utile ?
5.0 étoiles sur 5 Simplement excellent 19 février 2006
Format:Relié
Secrets and Lies est un excellent livre traitant de façon globale de la sécurité de l'information. Il ne s'agit en aucun cas d'un ouvrage technique. Le texte est très facilement abordable et rédigé de façon très claire. Le spécialiste du domaine devrait y trouver son compte tout autant que le néophyte. Probablement le meilleur texte qu'il m'ait été donné de lire sur le sujet.
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.4 étoiles sur 5  139 commentaires
126 internautes sur 133 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A must-read for true computer security professionals 30 octobre 2000
Par Richard Bejtlich - Publié sur Amazon.com
Format:Relié
I am an Air Force officer and technical resource for a 50-person military intrusion detection operation. I've seen Bruce speak twice and he never fails to impress. "Secrets and Lies" is no different. This book is not designed to teach readers about the latest security technologies. It was not written to promote specific products, although Bruce explains how the book's themes caused him to revamp his Counterpane firm. What the book does is teach security professionals how to think about their craft. I would recommend it to everyone in the field from day one, but its deeper meanings would probably not be evident until a year's work on the front lines.
Some of the ideas aren't new. For example, I've heard members of the L0pht petition for a software Underwriter's Lab for years, and others have encouraged liability laws for software vendors. Bruce builds on these ideas and weaves them into his own prescription for dealing with complex and inherently insecure systems. This is the type of book that gives a professional the vocabulary and framework to organize his understanding of the security process. "Secrets and Lies" creates the "little voice" that warns against a vendor's promises to solve all your problems with a $30,000 box-of-wonders.
Of particular interest to me, after training in economics, is Bruce's insistence that "the buying public has no way to differentiate real security from bad security." It logicially follows that the market cannot address this problem, since "perfect information" does not exist. Therefore, outside organizations (perhaps an FDA for software?) should get involved, but not by outlawing reverse engineering and security tools.
I give five stars to books that make the complex simple, that reveal and enhance technical details, or that change the way I look at the world. This book fits two, and possibly three of those categories. Bravo, Bruce.
85 internautes sur 91 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent intro infosec book that everyone should read 18 septembre 2000
Par J. G. Heiser - Publié sur Amazon.com
Format:Relié|Achat vérifié
Written by one of my favorite industry commentators, this is an introductory text on information security that should be useful to just about everyone. I highly recommend this book for the following audiences:
· Beginning security specialists
· IS and other business managers who make decisions about systems deployment
· Experienced security practitioners who want to improve their thinking and analysis skills
· Those studying for security certification, such as the CISSP
· Software and Internet product planning and marketing staff (and not just security software)
Schneier, who is recognized for his contributions to cryptography, has recently found religion. As recounted in a recent interview in "Information Security" magazine, he realized that humans were destroying the purity of his mathematical approach. Instead of retreating into academia, he tackled this issue head-on, some of the result of which is this landmark book. He recommends reading it cover to cover, and I agree with him-it takes all 400 pages to paint the complete story, and if you don't approach it linearly, you run the risk of missing the subtleties of the author's message. Skimming this book could easily trap a reader into equating vulnerability with risk. The world is full of risk, and while Schneier takes obvious delight in deconstructing the vulnerabilities of automated systems, it is important to understand that historical manual systems are quite vulnerable too, and humans deal with the risk quite nicely. Read the whole book.
The chapters that I found most significant included:
· (6 & 7) Cryptography: It is no surprise that he was written a terrific introduction to the concepts and building blocks (primitives and protocols) of encryption. Even techno-agnostics will find great value in his discussion of the problems with proprietary algorithms.
· (9) Identification & Authentication: An excellent introduction to the problems of passwords and helpful discussion of the limitations of biometrics. He makes it clear why biometrics are NOT a magic cure for security problems.
· (12) Network Defenses: Schneier tells it like it is! The ugly truth about sexy security toys.
· (13) Software Reliability: Best description of stack overflow that I've ever seen for a lay audience.
· (22) Product Testing and Verification: After crypto, evaluating software for security flaws is Schneier's other specialty, and he's written an awesome chapter. The author makes it very clear why it is unrealistic to expect invulnerable software, he single-handedly conducts a totally balanced debate on the merits of full disclosure, and he finishes the chapter with sage advice on approaching security product reviews with healthy skepticism.
I'm often asked to recommend introductory texts on information security, and unfortunately there really aren't that many good books for a newbie. If more books existed, I would probably give Schneier's book a 4 instead of a 5, but for now, this is one of the best. As he explains in the Afterward, his `epiphany' occurred only 12 months before completing the text-this isn't much time to become an expert in security process. His background is somewhat removed from day to day operations, and perhaps this lack of administrative experience results in a few weak areas. I suggest that the reader exercise some critical thinking and consult additional authorities when reading the following chapters:
· (4) Adversaries: his concept of computer criminals is a bit weak, pretty much lumping all transgressors into the mutually exclusive categories of `spy' or `hacker'.
· (5) Security Needs: Sof of his terminology lacks precision (perhaps inevitable when addressing a general audience). I disagree that a spoofed message represents an integrity failure, and I don't characterize audit as a requirement, but as a control.
· (15) Certificates and Credentials: He totally ignores the concept that practice statements (policies on CA and especially certificate management) provide any arbitrary level of assurance-the more stringent the rules, the higher the assurance. He doesn't discuss time stamping and other forms of third-party witnessing that can greatly strengthen a digital signature.
· (16) Security Tricks: His vehement attack on key recovery is politically extreme. The government's ill-conceived desire for key escrow should not affect the responsibility a corporation has to protect its own data. Who hasn't used an encryption product and lost a key?
· (21) Attack Trees: This is a marvelously useful idea, but he leaves the impression that these can be used to create quantifiable risk models, and I don't believe that putting information security risk in dollar value terms is practical.
Despite its length, the book is a quick read, and the informal tone makes it very approachable. It is addressed at a completely different audience than "Applied Cryptography"--it isn't a technical book--it is more of a business book. (Technical specialists would be well advised to read more business texts like this.) My copy is already well marked with highlighting and notes-this text has a lot of meat in it, and many new and useful ideas. If you find this book helpful in your job and you want to do additional reading, two complementary texts on the human aspects of infosec that I recommend are "The Process of Network Security" by Thomas Wadlow, and "Fighting Computer Crime : A New Framework for Protecting Information" by Donn B. Parker (I've reviewed both here on Amazon).
41 internautes sur 42 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Secrets and Lies and Schneier, oh my 6 septembre 2000
Par Un client - Publié sur Amazon.com
Format:Relié
_Secrets and Lies_ is a necessary book for everyone who wonders about privacy and security on the Internet--that is to say, everyone. Schneier discusses the threats in cyberspace, the technologies to combat them, and (most importantly) the strategies that make those technologies work. It's not surprising that the technical information is solid. What might be surprising to some, though, is how lucid and funny Schneier's writing is. He doesn't talk down to readers, but you don't have to be a complete techie to understand what he's saying.
Schneier's discussion of where things are and where they're going is fascinating and informative. I was especially interested by the legal stuff--many of the laws designed to enhance security and privacy actually damage it. Read this book, make your boss read it, make your IT manager read it, and send a copy to your congresscritter. It might just help make the Net safer.
18 internautes sur 20 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Classic Schneier 21 août 2000
Par Ryan L. Russell - Publié sur Amazon.com
Format:Relié
If you're a fan of Bruce Schneier, whether it be his live presentations, his books, or Crypto-Gram, then you'll love this book. Bruce has shifted his focus away somewhat from the deep technical details that he has in "Applied Cryptography." In this book, he delves more into the hows and whys of security, and focuses heavily on the trade-offs that reality forces security people to make. This book is a must-read for anyone responsible for making security decisions.
16 internautes sur 18 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 goes past the technology 31 août 2000
Par Robert Halloran - Publié sur Amazon.com
Format:Relié
Bruce has rightfully earned his reputation by explaining the technology of security. In this book he goes past that by explaining that security is a system, a process, and does it in his typical style that makes it completely understandable and actually a fun read. If you're responsible for security matters, you may not like seeing various 'social engineering' hacks exposed, but it's information that you and everyone using a computer these days needs to be aware of. Once again, Bruce brings a straightforward style to bear and makes sometimes difficult subject matter clear to the reader.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?