Secrets and lies : digital security in a networked world
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000nam a2200000 i 4500</leader>
<controlfield tag="001">MAP20070034989</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20220901133623.0</controlfield>
<controlfield tag="008">010612s2000 usa 000|0eng </controlfield>
<datafield tag="020" ind1=" " ind2=" ">
<subfield code="a">0-471-25311-1</subfield>
</datafield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">86</subfield>
</datafield>
<datafield tag="100" ind1="1" ind2=" ">
<subfield code="0">MAPA20080147716</subfield>
<subfield code="a">Schneier, Bruce</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="0">
<subfield code="a">Secrets and lies</subfield>
<subfield code="b">: digital security in a networked world</subfield>
<subfield code="c">Bruce Schneier</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="a">New York [etc.]</subfield>
<subfield code="b">John Wiley & Sons</subfield>
<subfield code="c">cop. 2000</subfield>
</datafield>
<datafield tag="300" ind1=" " ind2=" ">
<subfield code="a">XV, 412 p.</subfield>
<subfield code="c">24 cm</subfield>
</datafield>
<datafield tag="520" ind1="8" ind2=" ">
<subfield code="a">The landscape : Digital threats. Attacks. Adversaries. Security needs -- Technologies : Cryptography. Cryptography in context. Computer security. Identification and authentication. Networked-computer security. Network security. Network defenses. Software reliability. Secure hardware. Certificates and credentials. Security tricks. The human factor -- Strategies : vulnerabilities and the vulnerability landscape. Threat modeling and risk assessment. Security policies and countermeasures. Attack trees. Product testing and verification. The future of products. Security processes. Conclusion </subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080603731</subfield>
<subfield code="a">Seguridad informática</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080546991</subfield>
<subfield code="a">Empresas</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080547738</subfield>
<subfield code="a">Internet</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080639549</subfield>
<subfield code="a">Criptografía</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080587345</subfield>
<subfield code="a">Redes informáticas</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2=" ">
<subfield code="0">MAPA20080595296</subfield>
<subfield code="a">Comercio electrónico</subfield>
</datafield>
<datafield tag="856" ind1=" " ind2=" ">
<subfield code="y">MÁS INFORMACIÓN</subfield>
<subfield code="u">mailto:centrodocumentacion@fundacionmapfre.org?subject=Consulta%20de%20una%20publicaci%C3%B3n%20&body=Necesito%20m%C3%A1s%20informaci%C3%B3n%20sobre%20este%20documento%3A%20%0A%0A%5Banote%20aqu%C3%AD%20el%20titulo%20completo%20del%20documento%20del%20que%20desea%20informaci%C3%B3n%20y%20nos%20pondremos%20en%20contacto%20con%20usted%5D%20%0A%0AGracias%20%0A</subfield>
</datafield>
</record>
<record>
<leader>00000nxm a22000001n 4500</leader>
<controlfield tag="001">MAPF20080322526</controlfield>
<controlfield tag="003">MAPF</controlfield>
<controlfield tag="004">MAP20070034989</controlfield>
<controlfield tag="005">20080417224924.0</controlfield>
<controlfield tag="008">0804170u 8 0001bbspa0080417</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
</datafield>
<datafield tag="852" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="9">031410</subfield>
<subfield code="p">0000031410000</subfield>
<subfield code="h">86 SCH SEC</subfield>
</datafield>
</record>
</collection>