Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
-55% $12.50$12.50
Ships from: Amazon Sold by: miracleverse
Save with Used - Good
$7.90$7.90
Ships from: Amazon Sold by: Shakespeare Book House
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Secrets and Lies: Digital Security in a Networked World 1st Edition
Purchase options and add-ons
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security
- ISBN-100471453803
- ISBN-13978-0471453802
- Edition1st
- PublisherWiley
- Publication dateJanuary 30, 2004
- LanguageEnglish
- Dimensions6 x 1.19 x 9 inches
- Print length432 pages
Frequently bought together

Similar items that ship from close to you
Editorial Reviews
Review
“…peppered with lively anecdotes and aphorisms, making it a really accessible read...” (The ISSG Magazine, Autumn, 2004)
“…fascinating read…peppered with lively anecdotes…” (The ISSG Magazine, October 2004)
"...make yourself better informed. Read this book." (CVu, The Journal of the ACCU, Vol 16(3), June 2004)
From the Inside Flap
-The Economist
Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product - one that system administrators and corporate executives alike must understand to survive.
This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that's not yet everybody, it soon will be.
-Stephen H. Wildstrom, BusinessWeek
It's not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well.
-Dustin Puryear, Linux.com
Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible.
-Los Angeles Times
From the Back Cover
The Economist
Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?
The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product one that system administrators and corporate executives alike must understand to survive.
"This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that s not yet everybody, it soon will be."
Stephen H. Wildstrom, BusinessWeek
"It s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lies pulls off this feat rather well."
Dustin Puryear, Linux.com
"Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible."
Los Angeles Times
About the Author
Product details
- Publisher : Wiley; 1st edition (January 30, 2004)
- Language : English
- Paperback : 432 pages
- ISBN-10 : 0471453803
- ISBN-13 : 978-0471453802
- Item Weight : 1.1 pounds
- Dimensions : 6 x 1.19 x 9 inches
- Best Sellers Rank: #872,928 in Books (See Top 100 in Books)
- #126 in Computer Networks
- #126 in CompTIA Certification Guides
- #251 in Computer Networking (Books)
- Customer Reviews:
About the author

Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of 12 books -- including "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" -- as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book highly informative, thorough, and understandable. They describe it as a thoughtful read and say it's worth reading. Readers also mention it's a good introduction to the cyber security community and beneficial for IT and security managers.
AI-generated from the text of customer reviews
Customers find the book highly informative, thorough, and well-written. They say the author does a great job at making the subject understandable. Readers also appreciate the practical examples and real-world examples. They mention the book provides a broad spectrum of topics and issues involved in world-wide security.
"...Cryptography: It is no surprise that he was written a terrific introduction to the concepts and building blocks (primitives and protocols) of..." Read more
"...Lies: Digital Security in a Networked World" is the perfect book to hand to new bosses or new employees coming in the door who have not been..." Read more
"...Secrets and Lies is a well organized book with plenty of real world examples, problems and solutions...." Read more
"This is basically a good book. Very readable, usually very clear, very broad scope...." Read more
Customers find the book well-written, clear, and worth reading. They also say it provides a great overview of the world of information security.
"...a good introduction to the cyber security community, and Schneier tells the story well...." Read more
"...Secrets and Lies is a well organized book with plenty of real world examples, problems and solutions...." Read more
"This is basically a good book. Very readable, usually very clear, very broad scope...." Read more
"...This book is definitely worth reading." Read more
Customers find the book great for those interested in security. They say it's a good introduction to the cyber security community. Readers also mention that the author takes complicated security techniques and explains them clearly.
"...of my favorite industry commentators, this is an introductory text on information security that should be useful to just about everyone...." Read more
"...It is also the perfect book for seasoned security practitioners who want an overview of the key issues facing our community today...." Read more
"This is an excellent information security book that everyone working in this field should read...." Read more
"...Kind of scary to see the lack of security that is actually out there to protect our information on the web. Be careful!" Read more
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
· Beginning security specialists
· IS and other business managers who make decisions about systems deployment
· Experienced security practitioners who want to improve their thinking and analysis skills
· Those studying for security certification, such as the CISSP
· Software and Internet product planning and marketing staff (and not just security software)
Schneier, who is recognized for his contributions to cryptography, has recently found religion. As recounted in a recent interview in "Information Security" magazine, he realized that humans were destroying the purity of his mathematical approach. Instead of retreating into academia, he tackled this issue head-on, some of the result of which is this landmark book. He recommends reading it cover to cover, and I agree with him-it takes all 400 pages to paint the complete story, and if you don't approach it linearly, you run the risk of missing the subtleties of the author's message. Skimming this book could easily trap a reader into equating vulnerability with risk. The world is full of risk, and while Schneier takes obvious delight in deconstructing the vulnerabilities of automated systems, it is important to understand that historical manual systems are quite vulnerable too, and humans deal with the risk quite nicely. Read the whole book.
The chapters that I found most significant included:
· (6 & 7) Cryptography: It is no surprise that he was written a terrific introduction to the concepts and building blocks (primitives and protocols) of encryption. Even techno-agnostics will find great value in his discussion of the problems with proprietary algorithms.
· (9) Identification & Authentication: An excellent introduction to the problems of passwords and helpful discussion of the limitations of biometrics. He makes it clear why biometrics are NOT a magic cure for security problems.
· (12) Network Defenses: Schneier tells it like it is! The ugly truth about sexy security toys.
· (13) Software Reliability: Best description of stack overflow that I've ever seen for a lay audience.
· (22) Product Testing and Verification: After crypto, evaluating software for security flaws is Schneier's other specialty, and he's written an awesome chapter. The author makes it very clear why it is unrealistic to expect invulnerable software, he single-handedly conducts a totally balanced debate on the merits of full disclosure, and he finishes the chapter with sage advice on approaching security product reviews with healthy skepticism.
I'm often asked to recommend introductory texts on information security, and unfortunately there really aren't that many good books for a newbie. If more books existed, I would probably give Schneier's book a 4 instead of a 5, but for now, this is one of the best. As he explains in the Afterward, his `epiphany' occurred only 12 months before completing the text-this isn't much time to become an expert in security process. His background is somewhat removed from day to day operations, and perhaps this lack of administrative experience results in a few weak areas. I suggest that the reader exercise some critical thinking and consult additional authorities when reading the following chapters:
· (4) Adversaries: his concept of computer criminals is a bit weak, pretty much lumping all transgressors into the mutually exclusive categories of `spy' or `hacker'.
· (5) Security Needs: Sof of his terminology lacks precision (perhaps inevitable when addressing a general audience). I disagree that a spoofed message represents an integrity failure, and I don't characterize audit as a requirement, but as a control.
· (15) Certificates and Credentials: He totally ignores the concept that practice statements (policies on CA and especially certificate management) provide any arbitrary level of assurance-the more stringent the rules, the higher the assurance. He doesn't discuss time stamping and other forms of third-party witnessing that can greatly strengthen a digital signature.
· (16) Security Tricks: His vehement attack on key recovery is politically extreme. The government's ill-conceived desire for key escrow should not affect the responsibility a corporation has to protect its own data. Who hasn't used an encryption product and lost a key?
· (21) Attack Trees: This is a marvelously useful idea, but he leaves the impression that these can be used to create quantifiable risk models, and I don't believe that putting information security risk in dollar value terms is practical.
Despite its length, the book is a quick read, and the informal tone makes it very approachable. It is addressed at a completely different audience than "Applied Cryptography"--it isn't a technical book--it is more of a business book. (Technical specialists would be well advised to read more business texts like this.) My copy is already well marked with highlighting and notes-this text has a lot of meat in it, and many new and useful ideas. If you find this book helpful in your job and you want to do additional reading, two complementary texts on the human aspects of infosec that I recommend are "The Process of Network Security" by Thomas Wadlow, and "Fighting Computer Crime : A New Framework for Protecting Information" by Donn B. Parker (I've reviewed both here on Amazon).
"Secrets and Lies: Digital Security in a Networked World" is the perfect book to hand to new bosses or new employees coming in the door who have not been exposed to cyber security in their past lives. It is also the perfect book for seasoned security practitioners who want an overview of the key issues facing our community today. Schneier wrote it more than a decade ago, but its ideas still resonate. He talks about the idea that “security is a process, not a product.” With that one line, Schneier captures the essence of what our cyber security community should be about. He explains that even though we have advanced technology designed to specifically find cyber break-ins, people are the still the weakest link. He describes how cyber risk is not a special category. It is just another risk to the business. He highlights the ludicrous idea that software vendors have no liability or selling buggy code, and he was one of the first thought leaders to characterize the adversary as something more than just a hacker. He makes the case for things that the cyber security community still needs in order to make the Internet more secure, things like strengthening confidentiality, integrity, and availability (CIA); improving Internet privacy and Internet anonymity; and challenging the idea that security practitioners must make the Sophie’s Choice between better security or more privacy in terms of government surveillance. Finally, he anticipates the need for a Bitcoin-like capability long before Bitcoin became popular. The content within Secrets and Lies is a good introduction to the cyber security community, and Schneier tells the story well. Because of that, Secrets and Lies is candidate for the cyber security canon, and you should have read it by now.
The author is very specific about the security domains without being too technical but instead focusing on the "philosophy" behind each caveat. In that regards he shows the many way crackers can harm our security and how far we have advanced in combating them. He has a sort of pessimistic view regarding this because as he claims the bad guys are already ahead of governments and other organizations because of their unwillingness to think of security as a process but rather as a product to be installed without proper metrics measurement and capacity planning.
Secrets and Lies is a well organized book with plenty of real world examples, problems and solutions. Buy a copy for yourself, and many more for everybody else you know, we will all benefit in the end.
Top reviews from other countries
Seule condition: il faut lire l'anglais.





