WorldCat Identities

Schneier, Bruce 1963-

Overview
Works: 78 works in 432 publications in 10 languages and 14,820 library holdings
Genres: Conference papers and proceedings  Case studies 
Roles: Author, Editor, Creator, Interviewee
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Bruce Schneier
Data and Goliath : the hidden battles to collect your data and control your world by Bruce Schneier( Book )

12 editions published between 2015 and 2016 in English and held by 2,003 WorldCat member libraries worldwide

"Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we're offered. Governments use surveillance to discriminate, censor, and chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we've gained? Security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day."--Book jacket
Applied cryptography : protocols, algorithms, and source code in C by Bruce Schneier( Book )

77 editions published between 1993 and 2015 in 6 languages and held by 1,932 WorldCat member libraries worldwide

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover
Secrets and lies : digital security in a networked world by Bruce Schneier( Book )

66 editions published between 2000 and 2015 in 9 languages and held by 1,897 WorldCat member libraries worldwide

"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket
Beyond fear : thinking sensibly about security in an uncertain world by Bruce Schneier( Book )

27 editions published between 2003 and 2013 in English and held by 871 WorldCat member libraries worldwide

In "Beyond Fear," Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for
Liars and outliers : enabling the trust that society needs to thrive by Bruce Schneier( Book )

20 editions published between 2012 and 2015 in 3 languages and held by 685 WorldCat member libraries worldwide

In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows the unique role of trust in facilitating and stabilizing human society. He discusses why and how trust has evolved, why it works the way it does, and the ways the information society is changing everything. - Publisher
The electronic privacy papers : documents on the battle for privacy in the age of surveillance by Bruce Schneier( Book )

10 editions published between 1997 and 1998 in English and Undetermined and held by 573 WorldCat member libraries worldwide

E-mail security : how to keep your electronic messages private by Bruce Schneier( Book )

14 editions published in 1995 in English and held by 546 WorldCat member libraries worldwide

Privacy and electronic mail. The problem. Encryption. Key management. Authentication. Certificates. Keeping your private key private. Odds and ends. Patents, governments, and export laws. Achieving electronic-mail privacy. Requirements and features. Privacy enhanced mail (PEN). Pretty good privacy (PGP). Comparing PGP and PEM. Attacks against PGP and PEM. Pretty good privacy. Privacy enhanced mail
Schneier on security by Bruce Schneier( Book )

17 editions published between 2008 and 2013 in English and held by 344 WorldCat member libraries worldwide

This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem, the industry power struggle over controlling your computer, and why national ID cards won't make us safer, only poorer. Schneier recognizes that the ultimate security risk is people and that many security paractices are, in fact, secuirty risks. -- From publisher description
Cryptography engineering : design principles and practical applications by Tadayoshi Kohno( Book )

15 editions published between 2010 and 2013 in English and held by 284 WorldCat member libraries worldwide

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start
Fast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings by Gerhard Goos( Book )

22 editions published between 2000 and 2002 in English and held by 253 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Fast Software Encryption, FSE 2000, held in New York City, USA in April 2000. The 21 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The volume presents topical sections on stream-cipher cryptanalysis, new ciphers, AES cryptanalysis, block-cipher cryptanalysis, and theoretical work
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings by J.-J Quisquater( Book )

20 editions published between 2000 and 2001 in English and held by 252 WorldCat member libraries worldwide

This volume constitutes the thoroughly refereed post-proceedings of the Third International Conference on Smart Card Research and Advanced Applications, CARDIS'98, held in Louvain-la-Neuve, Belgium in September 1998. The 35 revised full papers presented were carefully reviewed and updated for inclusion in this book. All current aspects of smart card research and applications development are addressed, in particular: Java cards, electronic commerce, efficiency, security (including cryptographic algorithms, cryptographic protocols, and authentication), and architecture
The twofish encryption algorithm : a 128-bit block cipher( Book )

6 editions published in 1999 in English and held by 167 WorldCat member libraries worldwide

A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: all aspects of Twofish's design and anatomy, twofish performance and testing results, step-by-step instructions on how to use it in your systems, and complete source code, in C, for implementing Twofish
Carry on : sound advice from Schneier on security by Bruce Schneier( Book )

11 editions published between 2013 and 2014 in English and Undetermined and held by 132 WorldCat member libraries worldwide

Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events t
Protect your Macintosh by Bruce Schneier( Book )

2 editions published in 1994 in English and held by 89 WorldCat member libraries worldwide

Applied cryptography, second edition : protocols, algorithms, and source code in C by Bruce Schneier( Book )

2 editions published in 2015 in English and held by 52 WorldCat member libraries worldwide

"This special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published." -- Book jacket. New introduction by the author
Data and Goliath the hidden battles to capture your data and control your world by Bruce Schneier( Recording )

3 editions published in 2015 in English and held by 47 WorldCat member libraries worldwide

You are under surveillance right now. Your cell phone provider tracks your location, your online and in-store purchasing patterns are recorded, Facebook can determine your sexual orientation without you ever mentioning it. Corporations use surveillance to manipulate the prices we're offered; governments use surveillance to discriminate, censor, and put people in danger worldwide. Schneier shows what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day
Die Kunst des Vertrauens by Bruce Schneier( Book )

4 editions published in 2012 in German and held by 47 WorldCat member libraries worldwide

Hauptbeschreibung Wir verlangen keine Sicherheitsüberprüfung des Klempners, der zu uns kommt, um einen undichten Abfluss zu reparieren. Wir führen an Nahrungsmitteln, die wir essen, keine chemische Analyse durch. Vertrauen und Zusammenarbeit waren Probleme, die der Mensch auf seinem Weg zum sozialen Wesen als erste zu lösen hatte. Heute, da die traditionellen Mechanismen des Vertrauens in unserer globalen Gesellschaft nicht länger funktionieren, gehören sie wieder zu den Aufgaben, die wir dringend angehen müssen. Bruce Schneier, weltberühmt für seine sachlichen
Economics of information security and privacy III by Bruce Schneier( Book )

7 editions published in 2013 in English and held by 25 WorldCat member libraries worldwide

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
Bruce schneier on trust set by Bruce Schneier( Book )

4 editions published in 2014 in English and held by 5 WorldCat member libraries worldwide

This set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Carry On: Sounds Advice from Schneier on Security. In Liars and Outliers, Schneier covers the topic of trust in society and how issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.39 (from 0.05 for Schneier o ... to 0.79 for Die Kunst ...)

Secrets and lies : digital security in a networked world
Alternative Names
Bruce Schneier Amerikaans wiskundige

Bruce Schneier crittografo e saggista statunitense

Bruce Schneier informaticien américain

Bruce Schneier US-amerikanischer Sachbuchautor und Kryptologe

Schneier, Bruce

Šnajer, Brus

Брус Шнайър

Брюс Шнайєр

Шнайер, Б 1963-

Шнайер, Брюс американский криптограф, писатель и специалист по компьютерной безопасности

ברוס שנייר

브루스 슈나이어 미국의 컴퓨터 과학자

슈나이어, 브루스

シュナイアー, ブルース

ブルース・シュナイアー

布魯斯·施奈爾

Languages
Covers
Secrets and lies : digital security in a networked worldBeyond fear : thinking sensibly about security in an uncertain worldLiars and outliers : enabling the trust that society needs to thriveThe electronic privacy papers : documents on the battle for privacy in the age of surveillanceE-mail security : how to keep your electronic messages privateSchneier on securityCryptography engineering : design principles and practical applicationsFast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings