Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked World

by Bruce Schneier (Author)

Synopsis

Praise for Sectrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library." Business Week "Clear and passionate, this is the definitive book on Internet security from the leading thinker on the subject." The Industry Standard "Startlingly lively...a jewel box of little surprises you can actually use." Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect." Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online almost everyone, in other words." The Economist "Schneier peppers the book with lively anecdotes and aphorisms, making it unusually accessible." Los Angeles Times

$3.25

Save:$20.51 (86%)

Quantity

2 in stock

More Information

Format: Hardcover
Pages: 432
Publisher: John Wiley & Sons
Published: 05 Sep 2000

ISBN 10: 0471253111
ISBN 13: 9780471253112

Media Reviews
Stephen Manes writes, ...Bruce Schneier minces no words in describing the many ways computer systems can be compromised . (Forbes) ...this book isn't just for techies. Schneier peppers the book with lively anecdotes and aphorisms, making it unusually accessible. (LA Times) Schneier's book is an excellent read... He understands the issues and the issues behind the issues. (Bill Machrone) Secrets and Lies should begin to dispel the fog of deception and special pleading around security, and it's fun.. (New Scientist, 2nd September 2000) Bruce Schneier's book is a common-sense, practical guide... (Computing, 22nd March 2001) As a thoughtful read, prior to planning or reviewing your business's security strategy, you could not do better... (Unixnt, February 2001) ...worth a read... (The Journal, November 2000) ...essential reading for security practitioners... (Computer Bulletin - Book of the Month, January 2001) ...provides a timely debunking of myths...an invaluable reference point (Computer Business Review, November 2000) not only is it entertaining, but it is likely to end up on the reference shelf of thousan ds of CIOs worldwide. (Information Age, December 2000) ...a good read... The book is interesting [and] educational... (E-business, Jan 2001) ...a pragmatic, stimulating and rather readable guide... (The Bookseller, 17th November 2000) This book is a must for any business person with a stake in e-commerce. (EuroBusiness, December 2000) ...a jewel box of little surprises you can actually use ...a startlingly lively treatise... (Fortune, 27th November 2000) A thoroughly practical and accessible guide... (Webspace, November 2000) [It's] written like a thriller (and a good one at that)... (Managing Information Strategies, November 2000) Anyone who does business online should buy this book and read it carefully. (QSDG, December 2000) The book is an impressive 'how to think' like a hacker. (Supply Management, 16th November 2000) Schneier writes with a pleasingly readable style. (MacFormat, December 2000) Setting himself apart, Schneier navigates rough terrain without being overly technical or sensational... (Computer Weekly, 26th October 2000) ...a very practical guide... (Webspace, October 2000) A thoroughly practical and accessible guide to achieving security (Webspace, August 2001) ...if you haven't read Secrets and Lies yet, you should. If you have but it's been a while, take it along for your next plane ride... (Technology and Society, 7 February 2003)
Author Bio
BRUCE SCHNEIER is CTO and cofounder of Counterpane Internet Security, Inc., the first managed security monitoring services firm. He is the bestselling author of Applied Cryptography (Wiley) and a contributor to numerous business and technical publications. Schneier is also a frequent keynote speaker at conferences, and a creator of the Blowfish and Twofish encryption algorithms.