000 -LEADER |
fixed length control field |
04509cam a22004457i 4500 |
001 - CONTROL NUMBER |
control field |
18479304 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170825145428.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150204s2015 inua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2015932613 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119092434 |
Qualifying information |
(cloth) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119092438 |
Qualifying information |
(cloth) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn906119939 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CDX |
Language of cataloging |
eng |
Transcribing agency |
CDX |
Description conventions |
rda |
Modifying agency |
IMR |
-- |
SFR |
-- |
CWJ |
-- |
OCLCQ |
-- |
DGU |
-- |
YDXCP |
-- |
IBI |
-- |
LTSCA |
-- |
OCLCF |
-- |
VP@ |
-- |
EDK |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S352 2015 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schneier, Bruce, |
Dates associated with a name |
1963- |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Secrets and lies : |
Remainder of title |
digital security in a networked world / |
Statement of responsibility, etc |
Bruce Schneier. |
246 30 - VARYING FORM OF TITLE |
Title proper/short title |
Digital security in a networked world |
246 14 - VARYING FORM OF TITLE |
Title proper/short title |
Secrets & lies |
250 ## - EDITION STATEMENT |
Edition statement |
Fifteenth Anniversary Edition. |
264 #1 - |
-- |
Indianapolis, Indiana : |
-- |
John Wiley & Sons, Inc., |
-- |
[2015] |
264 #4 - |
-- |
©2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvii, 414 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
unmediated |
-- |
n |
-- |
rdamedia |
338 ## - |
-- |
volume |
-- |
nc |
-- |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Originally published: 2000. |
500 ## - GENERAL NOTE |
General note |
With a new introduction by the author. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword to 2015 15th anniversary edition -- Introduction from the paperback edition -- Preface -- About the author -- Part 1: Landscape: -- Digital threats -- Attacks -- Adversaries -- Security needs -- Part 2: Technologies: -- Cryptography -- Cryptography in context -- Computer security -- Identification and authentication -- Networked-computer security -- Network security -- Network defenses -- Software reliability -- Secure hardware -- Certificates and credentials -- Security tricks -- Human factor -- Part 3: Strategies: -- Vulnerabilities and the vulnerability landscape -- Threat modeling and risk assessment -- Security policies and countermeasures -- Attack trees -- Product testing and verification -- Future of products -- Security processes -- Conclusion -- Afterword -- Resources -- Acknowledgments -- Index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Overview: Secrets and Lies remains as relevant, if not more relevant today than when first published in 2000. This special 15th anniversary edition celebrates a decade and a half of smart, straight-forward advice on achieving security throughout computer networks from the leading authority on security. Inside you will find a compelling introduction by author Bruce Schneier written specifically for this keepsake edition, one that security enthusiasts everywhere will enjoy. This timeless bestseller explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone and learn how to understand and arm yourself against the threats of our connected world. There are no quick fixes for digital security. And with the number of security vulnerabilities, breaches, and digital disasters increasing over time, it's vital that you learn how to manage the vulnerabilities and protect your data in this networked world. You need to understand who the attackers are, what they want, and how to deal with the threats they represent. In Secrets and Lies, you'll learn about security technologies and product capabilities, as well as their limitations. And you'll find out how to respond given the landscape of your system and the limitations of your business. With its accessible style, this practical guide covers: Digital threats and attacks that you must understand. -- Security products and processes. -- Limitations of technology. -- Steps involved in product testing to discover security flaws. -- Risk assessment in your company. -- Implementation of security policies and countermeasures. Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
fast |
-- |
(OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Source of heading or term |
fast |
-- |
(OCoLC)fst00872484 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
925 0# - |
-- |
acquire |
-- |
1 shelf copy |
-- |
policy default |