|Other Retailer||Price Checked Time||Their Price in AUD||Our Price|
|Amazon UK||today||39.79||$23.69||You save $16.10|
|Amazon US||5 days ago||25.36||$23.69||You save $1.67|
Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product one that system administrators and corporate executives alike must understand to survive.
" This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that s not yet everybody, it soon will be."
Stephen H. Wildstrom, BusinessWeek
" It s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well."
Dustin Puryear, Linux.com
" Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible."
Los Angeles Times
THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. Vulnerabilities and the Vulnerability Landscape. Threat Modeling and Risk Assessment. Security Policies and Countermeasures. Attack Trees. Product Testing and Verification. The Future of Products. Security Processes. Conclusion. Afterword. Resources. Index.
Bruce Schneier is the founder and CTO of Counterpane Internet Security, Inc., the recognized leader in network security services. The bestselling author of Beyond Fear: Thinking Sensibly About Security in an Uncertain World and Applied Cryptography, he is an internationally respected security expert.
??The security technologies available are described in a user-friendly way without going into depth...? (Computer Bulletin, January 2005) ??peppered with lively anecdotes and aphorisms, making it a really accessible read...? (The ISSG Magazine, Autumn, 2004) ??fascinating read?peppered with lively anecdotes?? (The ISSG Magazine, October 2004) "...make yourself better informed. Read this book." (CVu, The Journal of the ACCU, Vol 16(3), June 2004)