Explore the latest books of this year!
Bookbot

Bruce Schneier

    January 15, 1963

    Bruce Schneier is a leading global authority on security, known for his incisive analyses of complex systems and human behavior. He crafts prose that illuminates the intricate workings of security and privacy in our interconnected world. Through his extensive writings and public discourse, Schneier has established himself as a vital voice shaping the global conversation on technological risks and societal resilience.

    Click here to kill everybody : security and survival in a hyper-connected world
    Schneier on Security
    Secrets and lies : digital security in a networked world
    Data & Goliath
    Beyond Fear
    Applied Cryptography
    • 2023

      It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.

      A Hacker's Mind
    • 2018

      "The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"--Provided by the publisher.

      Click here to kill everybody : security and survival in a hyper-connected world
    • 2015

      Data & Goliath

      • 383 pages
      • 14 hours of reading
      4.0(2246)Add rating

      A shocking look at the ways corporations and governments track and control us, and the ways we can fight back.

      Data & Goliath
    • 2014

      Carry On

      • 356 pages
      • 13 hours of reading

      Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that are valuable for security experts and ordinary citizens alike. Bruce Schneier's worldwide reputation as a security guru has earned him more than 250,000 loyal blog and newsletter readers This anthology offers Schneier's observations on some of the most timely security issues of our day, including the Boston Marathon bombing, the NSA's Internet surveillance, ongoing aviation security issues, and Chinese cyber-attacks It features the author's unique take on issues involving crime, terrorism, spying, privacy, voting, security policy and law, travel security, the psychology and economics of security, and much more Previous Schneier books have sold over 500,000 copies Carry On: Sound Advice from Schneier on Security is packed with information and ideas that are of interest to anyone living in today's insecure world.

      Carry On
    • 2012

      In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system.

      Liars and Outliers
    • 2010

      Cryptography Engineering

      Design Principles and Practical Applications

      • 384 pages
      • 14 hours of reading

      The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

      Cryptography Engineering
    • 2008

      Schneier on Security

      • 328 pages
      • 12 hours of reading
      3.9(384)Add rating

      Schneier on Security will be divided into sections:- Computer Security- Security and Privacy- Economics of Security- National Security and Terrorism Sample articles: - Why Vista's DRM Is Bad For You- When the Internet Is My Hard Drive, Should I Trust Third Parties?- Steal This Wi-Fi- Lessons From the Facebook Riots- The ID Chip You Don't Want in Your Passport- Camera Phones vs. Crime: Now We're Talking- MySpace Passwords Aren't So Dumb- An American Idol for Crypto Geeks- Why Smart Cops Do Dumb Things- How Security Companies Sucker Us With LemonsEach section will have a significant introduction by the author. As well, the author will be writing at least 6-10 never-before-published articles.

      Schneier on Security
    • 2003

      Beyond Fear

      • 295 pages
      • 11 hours of reading
      4.0(669)Add rating

      Do we really need national ID cards? Is it a good idea for pilots to carry pistols? Schneier makes the complex topic of security easy to comprehend. Using Schneier's 5-point method for analyzing any kind of security solution, he shows the reader how to become a well-informed security consumer

      Beyond Fear
    • 2000

      Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can't do in achieving digital security

      Secrets and lies : digital security in a networked world
    • 1996

      Applied Cryptography

      • 784 pages
      • 28 hours of reading
      4.4(314)Add rating

      "... the best introduction to cryptography I've ever seen... The book the National Security Agency wanted never to be published... " -Wired Magazine "... monumental... fascinating... comprehensive... the definitive work on cryptography for computer programmers... " -Dr. Dobb's Journal "...

      Applied Cryptography