Bruce Schneier
Author
Language
English
Formats
Description
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our...
Author
Language
English
Formats
Description
This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem,...
Author
Language
English
Formats
Description
A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers...
Author
Pub. Date
[2015]
Language
English
Description
"A fellow at the Harvard Center for Internet and Society, Bruce Schneier has been called 'one of the world's foremost security experts' (Wired). In Data and Goliath, Schneier offers a sobering look at government/corporate surveillance and the ever-rising threat to personal privacy and freedom"--Provider website
Author
Pub. Date
2019.
Language
English
Description
Long gone are the days when computer security was about data. Now, it's about the much more critical and personal issues of life and property. The impact of this change means two things: Data authentication and integrity concerns will trump those of confidentiality The idea of an internet without regulations will be a thing of the past While these consequences are inevitable, we can prepare for them. First, by looking at previous attempts to secure...
Author
Pub. Date
2020.
Language
English
Description
Information security, IoT safety, data privacy, algorithmic security and fairness, AI, biotech, the future of work-information technology is now a public policy issue. But while an understanding of the technology involved is fundamental to crafting good policy, there's little involvement of technologists in policy discussions. This isn't sustainable. We need public interest technologists: people from our fields helping craft policy and providing security...
Author
Language
English
Description
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better...
Author
Pub. Date
[2015]
Language
English
Description
"This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems....
Author
Pub. Date
c2014
Language
English
Description
"Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful,...