Text
Secrets and lies: digital security in a networked world
Table of Contents
THE LANDSCAPE.
Digital Threats.
Attacks.
Adversaries.
Security Needs.
TECHNOLOGIES.
Cryptography.
Cryptography in Context.
Computer Security.
Identification and Authentication.
Networked-Computer Security.
Network Security.
Network Defenses.
Software Reliability.
Secure Hardware.
Certificates and Credentials.
Security Tricks.
The Human Factor.
STRATEGIES.
Vulnerabilities and the Vulnerability Landscape.
Threat Modeling and Risk Assessment.
Security Policies and Countermeasures.
Attack Trees.
Product Testing and Verification.
The Future of Products.
Security Processes.
Conclusion.
No other version available