000 05377cam a2200901 a 4500
001 ocn606404498
003 OCoLC
005 20240523125531.0
006 m o d
007 cr bn||||||abp
007 cr bn||||||ada
008 100411s2000 nyu ob 001 0 eng d
040 _aOCLCE
_beng
_epn
_cOCLCE
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCF
_dCCO
_dYDXCP
_dDG1
_dOCLCQ
_dDEBBG
_dYDX
_dDG1
_dMOR
_dZ5A
_dLIP
_dOTZ
_dOCLCQ
_dOCLCO
_dOCLCA
_dOCLCQ
_dINARC
_dOCLCA
_dOCLCQ
_dAU@
_dOCLCQ
_dU3W
_dOCLCQ
_dHS0
_dOCLCQ
_dOCLCO
_dS2H
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a608753581
_a885220261
_a988418293
_a992839391
_a1036940419
_a1081129581
_a1109249010
_a1162437747
_a1175600488
_a1303404995
020 _a9781119183631
_q(electronic bk.)
020 _a1119183634
_q(electronic bk.)
020 _a9781118075074
020 _a1118075072
020 _a1118082273
020 _a9781118082270
020 _z0471253111
_q(alk. paper)
020 _z9780471253112
_q(alk. paper)
020 _z0471453803
_q(pbk. ;
_qalk. paper)
020 _z9780471453802
029 1 _aAU@
_b000062476764
029 1 _aCHBIS
_b010661146
029 1 _aCHNEW
_b000642440
029 1 _aCHNEW
_b000935166
029 1 _aCHVBK
_b480155100
029 1 _aDEBBG
_bBV043391033
029 1 _aDEBSZ
_b484981471
029 1 _aGBVCP
_b856568880
035 _a(OCoLC)606404498
_z(OCoLC)608753581
_z(OCoLC)885220261
_z(OCoLC)988418293
_z(OCoLC)992839391
_z(OCoLC)1036940419
_z(OCoLC)1081129581
_z(OCoLC)1109249010
_z(OCoLC)1162437747
_z(OCoLC)1175600488
_z(OCoLC)1303404995
042 _adlr
050 4 _aQA76.9.A25
_bS352 2000
082 0 4 _a005.8
_221
084 _a54.32
_2bcl
049 _aMAIN
100 1 _aSchneier, Bruce,
_d1963-
_1https://id.oclc.org/worldcat/entity/E39PBJrKYhDmywQTtHTwP7y68C
245 1 0 _aSecrets and lies :
_bdigital security in a networked world /
_cBruce Schneier.
260 _aNew York :
_bJohn Wiley,
_c2000.
300 _a1 online resource (xv, 412 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 0 _g1.
_tIntroduction --
_gpt. 1.
_tThe landscape --
_g2.
_tDigital threats --
_g3.
_tAttacks --
_g4.
_tAdversaries --
_g5.
_tSecurity needs --
_gpt. 2.
_tTechnologies --
_g6.
_tCryptography --
_g7.
_tCryptography in context --
_g8.
_tComputer security --
_g9.
_tIdentification and authentication --
_g10.
_tNetworked-computer security --
_g11.
_tNetwork security --
_g12.
_tNetwork defenses --
_g13.
_tSoftware reliability --
_g14.
_tSecure hardware --
_g15.
_tCertificates and credentials --
_g16.
_tSecurity tricks --
_g17.
_tThe human factor --
_gpt. 3.
_tStrategies --
_g18.
_tVulnerabilities and the vulnerability landscape --
_g19.
_tT.
504 _aIncludes bibliographical references (pages 399-400) and index.
506 _3Use copy
_fRestrictions unspecified
_2star
_5MiAaHDL
533 _aElectronic reproduction.
_b[Place of publication not identified] :
_cHathiTrust Digital Library,
_d2010.
_5MiAaHDL
538 _aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
_uhttp://purl.oclc.org/DLF/benchrepro0212
_5MiAaHDL
583 1 _adigitized
_c2010
_hHathiTrust Digital Library
_lcommitted to preserve
_2pda
_5MiAaHDL
588 0 _aPrint version record.
520 1 _a"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket
546 _aEnglish.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 2 _aComputer Security
650 6 _aS�ecurit�e informatique.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
650 7 _aRechnernetz
_2gnd
650 7 _aDatensicherung
_2gnd
650 7 _aInternet
_2gnd
650 1 7 _aComputernetwerken.
_2gtt
650 1 7 _aDatabescherming.
_2gtt
650 7 _aR�eseaux d'ordinateurs
_xMesures de s�uret�e.
_2ram
650 7 _aEntreprises
_xR�eseaux d'ordinateurs
_xMesures de s�uret�e.
_2ram
758 _ihas work:
_aSecrets and lies (Text)
_1https://id.oclc.org/worldcat/entity/E39PCG4fjft4qfD8DvV9x8C9fy
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aSchneier, Bruce, 1963-
_tSecrets and lies.
_dNew York : John Wiley, 2000
_w(DLC) 00042252
_w(OCoLC)44167178
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119183631
938 _aInternet Archive
_bINAR
_nsecretsliesdigit00schn
938 _aYBP Library Services
_bYANK
_n11211855
938 _aYBP Library Services
_bYANK
_n12647648
938 _aYBP Library Services
_bYANK
_n9659596
994 _a92
_bINLUM
999 _c11443
_d11443