000 03390cam a2200673Ka 4500
005 20250919211737.0
006 m o d
007 cr bn||||||abp
007 cr bn||||||ada
008 171212s2000 nyu ob 001 0 eng d
020 _a9781119183631
_q(electronic bk.)
020 _a1119183634
_q(electronic bk.)
020 _z0471253111
_q(alk. paper)
020 _z9780471253112
_q(alk. paper)
029 1 _aGBVCP
_b856568880
029 1 _aDEBBG
_bBV043391033
035 _a(OCoLC)606404498
_z(OCoLC)608753581
035 _a(OCoLC)ocn606404498
039 9 _a201902121523
_bros
_y12-12-2017
_zhafiz
_wMYUKM (1).mrc
_x234
040 _aOCLCE
_beng
_epn
_cOCLCE
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCF
_dCCO
_dYDXCP
_dDG1
_dOCLCQ
_dDEBBG
042 _adlr
049 _aMAIN
050 4 _aQA76.9.A25
_bS352 2000
082 0 4 _a005.8
_221
100 1 _aSchneier, Bruce,
_d1963-
245 1 0 _aSecrets and lies :
_bdigital security in a networked world /
_cBruce Schneier.
260 _aNew York :
_bJohn Wiley,
_c2000.
300 _a1 online resource (xv, 412 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references (pages 399-400) and index.
505 0 0 _g1.
_tIntroduction --
_gpt. 1.
_tThe landscape --
_g2.
_tDigital threats --
_g3.
_tAttacks --
_g4.
_tAdversaries --
_g5.
_tSecurity needs --
_gpt. 2.
_tTechnologies --
_g6.
_tCryptography --
_g7.
_tCryptography in context --
_g8.
_tComputer security --
_g9.
_tIdentification and authentication --
_g10.
_tNetworked-computer security --
_g11.
_tNetwork security --
_g12.
_tNetwork defenses --
_g13.
_tSoftware reliability --
_g14.
_tSecure hardware --
_g15.
_tCertificates and credentials --
_g16.
_tSecurity tricks --
_g17.
_tThe human factor --
_gpt. 3.
_tStrategies --
_g18.
_tVulnerabilities and the vulnerability landscape --
_g19.
_tT.
506 _3Use copy
_fRestrictions unspecified
_2star
_5MiAaHDL
533 _aElectronic reproduction.
_b[S.l.] :
_cHathiTrust Digital Library,
_d2010.
_5MiAaHDL
538 _aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
_uhttp://purl.oclc.org/DLF/benchrepro0212
_5MiAaHDL
583 1 _adigitized
_c2010
_hHathiTrust Digital Library
_lcommitted to preserve
_2pda
_5MiAaHDL
588 0 _aPrint version record.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 4 _asécurité information.
650 4 _afiabilité logiciel.
650 4 _aauthentification.
650 4 _aidentification.
650 4 _acryptographie.
650 4 _asécurité ordinateur.
650 4 _asécurité réseau.
650 6 _aSécurité informatique.
650 6 _aRéseaux d'ordinateurs
_xSécurité
_xMesures.
773 0 _tWiley e-books
776 0 8 _iPrint version:
_aSchneier, Bruce, 1963-
_tSecrets and lies.
_dNew York : John Wiley, 2000
_w(DLC) 00042252
_w(OCoLC)44167178
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119183631
_zWiley Online Library
907 _a.b16539801
_b2022-10-25
_c2019-11-12
942 _n0
914 _avtls003628906
998 _ae
_b2017-12-12
_cm
_dz
_feng
_gnyu
_y0
_z.b16539801
999 _c688923
_d688923