IES Management College And Research Centre

Image from Google Jackets

Beyond Fear thiking sensibly about security in an uncertain world Bruce Schneier

By: Material type: TextTextPublication details: Springer USA 2006Description: 295p HardISBN:
  • 9780387026206
Subject(s): DDC classification:
  • 363.32 Sch
Contents:
. Sensible security -- 1. All security involves trade-offs -- 2. Security trade-offs are subjective -- 3. Security trade-offs depend on power and agenda -- pt. 2. How security works -- 4. Systems and how they fail -- 5. Knowing the attackers -- 6. Attackers never change their tunes, just their instruments -- 7. Technology creates security imbalances -- 8. Security is a weakest-link problem -- 9. Brittleness makes for bad security -- 10. Security revolves around people -- 11. Detection works where prevention fails -- 12. Detection is useless without response -- 13. Identification, authentication, and authorization -- 14. All countermeasures have some value, but no countermeasure is perfect -- 15. Fighting terrorism -- pt. 3. The game of security -- 16. Negotiating for security -- 17. Security demystified.
Summary: Explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book Book Library Annexe ON SHELF SOCIOLOGY (CUP /SH ) 363.32/Sch/29493 (Browse shelf(Opens below)) Available 11129493
Book Book Library Annexe ON SHELF SOCIOLOGY (CUP /SH ) 363.32/Sch/29494 (Browse shelf(Opens below)) Available 11129494
Total holds: 0
Browsing Library Annexe shelves, Shelving location: ON SHELF, Collection: SOCIOLOGY (CUP /SH ) Close shelf browser (Hides shelf browser)
No cover image available
306/ Dav/ 27643 Inhuman bondage : 320/ GIR/ 27899 Hillary Clinton; 362/ Spa/ 28735 The baby business 363.32/Sch/29493 Beyond Fear 363.32/Sch/29494 Beyond Fear

. Sensible security --
1. All security involves trade-offs --
2. Security trade-offs are subjective --
3. Security trade-offs depend on power and agenda --
pt. 2. How security works --
4. Systems and how they fail --
5. Knowing the attackers --
6. Attackers never change their tunes, just their instruments --
7. Technology creates security imbalances --
8. Security is a weakest-link problem --
9. Brittleness makes for bad security --
10. Security revolves around people --
11. Detection works where prevention fails --
12. Detection is useless without response --
13. Identification, authentication, and authorization --
14. All countermeasures have some value, but no countermeasure is perfect --
15. Fighting terrorism --
pt. 3. The game of security --
16. Negotiating for security --
17. Security demystified.

Explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security.

There are no comments on this title.

to post a comment.

Circulation Timings: Monday to Saturday: 8:30 AM to 9:30 PM | Sundays/Bank Holiday during Examination Period: 10:00 AM to 6:00 PM