search for books and compare prices
Tables of Contents for Secrets and Lies
Chapter/Section Title
Page #
Page Count
Preface
xi
 
Acknowledgments
xv
 
Introduction
1
10
PART 1: THE LANDSCAPE
11
72
Digital Threats
14
9
Attacks
23
19
Adversaries
42
17
Security Needs
59
24
PART 2: TECHNOLOGIES
83
188
Cryptography
85
17
Cryptography in Context
102
18
Computer Security
120
15
Identification and Authentication
135
16
Networked-Computer Security
151
25
Network Security
176
12
Network Defenses
188
14
Software Reliability
202
10
Secure Hardware
212
13
Certificates and Credentials
225
15
Security Tricks
240
15
The Human Factor
255
16
PART 3: STRATEGIES
271
125
Vulnerabilities and the Vulnerability Landscape
274
14
Threat Modeling and Risk Assessment
288
19
Security Policies and Countermeasures
307
11
Attack Trees
318
16
Product Testing and Verification
334
19
The Future of Products
353
14
Security Processes
367
22
Conclusion
389
7
Afterword
396
3
Resources
399
2
Index
401