Search

Secrets and lies : digital security in a networked world

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Schneier, Bruce</dc:creator>
<dc:date>2000</dc:date>
<dc:description xml:lang="es">The landscape : Digital threats. Attacks. Adversaries. Security needs -- Technologies : Cryptography. Cryptography in context. Computer security. Identification and authentication. Networked-computer security. Network security. Network defenses. Software reliability. Secure hardware. Certificates and credentials. Security tricks. The human factor -- Strategies : vulnerabilities and the vulnerability landscape. Threat modeling and risk assessment. Security policies and countermeasures. Attack trees. Product testing and verification. The future of products. Security processes. Conclusion </dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/22283.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:publisher>John Wiley & Sons</dc:publisher>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Seguridad informática</dc:subject>
<dc:subject xml:lang="es">Empresas</dc:subject>
<dc:subject xml:lang="es">Internet</dc:subject>
<dc:subject xml:lang="es">Criptografía</dc:subject>
<dc:subject xml:lang="es">Redes informáticas</dc:subject>
<dc:subject xml:lang="es">Comercio electrónico</dc:subject>
<dc:type xml:lang="es">Books</dc:type>
<dc:title xml:lang="es">Secrets and lies : digital security in a networked world</dc:title>
<dc:format xml:lang="es">XV, 412 p. ; 24 cm</dc:format>
</rdf:Description>
</rdf:RDF>