WorldCat Identities

Schneier, Bruce 1963-

Overview
Works: 90 works in 472 publications in 10 languages and 15,707 library holdings
Genres: Conference papers and proceedings  Case studies 
Roles: Author, Editor, Creator, Interviewee
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Bruce Schneier
Data and Goliath : the hidden battles to collect your data and control your world by Bruce Schneier( Book )

19 editions published between 2015 and 2016 in English and held by 2,151 WorldCat member libraries worldwide

"Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we're offered. Governments use surveillance to discriminate, censor, and chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we've gained? Security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day."--Jacket
Applied cryptography : protocols, algorithms, and source code in C by Bruce Schneier( Book )

52 editions published between 1993 and 2015 in English and held by 1,517 WorldCat member libraries worldwide

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover
Beyond fear : thinking sensibly about security in an uncertain world by Bruce Schneier( Book )

28 editions published between 2003 and 2013 in English and held by 862 WorldCat member libraries worldwide

Do we really need national ID cards? Is it a good idea for pilots to carry pistols? Schneier makes the complex topic of security easy to comprehend. Using Schneier's 5-point method for analyzing any kind of security solution, he shows the reader how to become a well-informed security consumer
Liars and outliers : enabling the trust that society needs to thrive by Bruce Schneier( Book )

20 editions published between 2012 and 2015 in 3 languages and held by 690 WorldCat member libraries worldwide

In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows the unique role of trust in facilitating and stabilizing human society. He discusses why and how trust has evolved, why it works the way it does, and the ways the information society is changing everything. - Publisher
Practical cryptography by Niels Ferguson( Book )

21 editions published between 2003 and 2006 in 6 languages and held by 621 WorldCat member libraries worldwide

<Readership: undergraduate; postgraduate; research, professional>
The electronic privacy papers : documents on the battle for privacy in the age of surveillance by Bruce Schneier( Book )

11 editions published between 1997 and 1998 in English and Undetermined and held by 573 WorldCat member libraries worldwide

E-mail security : how to keep your electronic messages private by Bruce Schneier( Book )

16 editions published in 1995 in English and held by 539 WorldCat member libraries worldwide

Privacy and electronic mail. The problem. Encryption. Key management. Authentication. Certificates. Keeping your private key private. Odds and ends. Patents, governments, and export laws. Achieving electronic-mail privacy. Requirements and features. Privacy enhanced mail (PEN). Pretty good privacy (PGP). Comparing PGP and PEM. Attacks against PGP and PEM. Pretty good privacy. Privacy enhanced mail
Secrets and lies : digital security in a networked world by Bruce Schneier( Book )

45 editions published between 2000 and 2015 in English and Undetermined and held by 531 WorldCat member libraries worldwide

A primer in practical computer security aimed at those shopping, communication, or doing business online. -- almost everyone, in other words. -- P. 4 of cover
Schneier on security by Bruce Schneier( Book )

17 editions published between 2008 and 2013 in English and held by 339 WorldCat member libraries worldwide

This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem, the industry power struggle over controlling your computer, and why national ID cards won't make us safer, only poorer. Schneier recognizes that the ultimate security risk is people and that many security paractices are, in fact, secuirty risks. -- From publisher description
Cryptography engineering : design principles and practical applications by Tadayoshi Kohno( Book )

15 editions published between 2010 and 2013 in English and held by 296 WorldCat member libraries worldwide

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start
Fast software encryption : 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000 : proceedings by Gerhard Goos( Book )

22 editions published between 2000 and 2002 in English and held by 256 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Fast Software Encryption, FSE 2000, held in New York City, USA in April 2000. The 21 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The volume presents topical sections on stream-cipher cryptanalysis, new ciphers, AES cryptanalysis, block-cipher cryptanalysis, and theoretical work
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings by Jean-Jacques Quisquater( Book )

22 editions published between 2000 and 2001 in English and held by 254 WorldCat member libraries worldwide

This volume constitutes the thoroughly refereed post-proceedings of the Third International Conference on Smart Card Research and Advanced Applications, CARDIS'98, held in Louvain-la-Neuve, Belgium in September 1998. The 35 revised full papers presented were carefully reviewed and updated for inclusion in this book. All current aspects of smart card research and applications development are addressed, in particular: Java cards, electronic commerce, efficiency, security (including cryptographic algorithms, cryptographic protocols, and authentication), and architecture
Angewandte Kryptographie : Protokolle, Algorithmen und Sourcecode in C by Bruce Schneier( Book )

18 editions published between 1995 and 2007 in 5 languages and held by 253 WorldCat member libraries worldwide

Cryptographie appliquée : protocoles, algorithmes et codes sources en C by Bruce Schneier( Book )

12 editions published between 1994 and 2001 in French and English and held by 224 WorldCat member libraries worldwide

Secrets et mensonges : sécurité numérique dans un monde en réseau by Bruce Schneier( Book )

16 editions published between 2000 and 2015 in 6 languages and held by 193 WorldCat member libraries worldwide

Annotation
The twofish encryption algorithm : a 128-bit block cipher( Book )

8 editions published in 1999 in English and held by 168 WorldCat member libraries worldwide

A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: all aspects of Twofish's design and anatomy, twofish performance and testing results, step-by-step instructions on how to use it in your systems, and complete source code, in C, for implementing Twofish
Carry on : sound advice from Schneier on security by Bruce Schneier( Book )

12 editions published between 2013 and 2014 in English and Undetermined and held by 136 WorldCat member libraries worldwide

An anthology of more than 155 essays by the author on his assessments of security and technology; the psychological, human, business, and economic aspects of security; privacy and surveillance; crime, terrorism, spying, and war; liberty and law, and more. Discover why our computer security is a feudal system; how science fiction writers can affect homeland security; why profiling actually makes us less safe; the myth of the transparent society; Google's and Facebook's privacy illusion; why the FBI and CIA failed to connect the dots on the Boston Marathon bombers; the story behind the Stuxnet virus; who should really be in charge of cybersecurity; how the US enabled the Chinese hacking of Google; and why scanners and sensors are the wrong way to secure the subway system.--From book jacket
Protect your Macintosh by Bruce Schneier( Book )

2 editions published in 1994 in English and held by 83 WorldCat member libraries worldwide

Economics of information security and privacy III by Bruce Schneier( Book )

8 editions published in 2013 in English and held by 26 WorldCat member libraries worldwide

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
Bruce schneier on trust set by Bruce Schneier( Book )

4 editions published in 2014 in English and held by 6 WorldCat member libraries worldwide

This set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Carry On: Sounds Advice from Schneier on Security. In Liars and Outliers, Schneier covers the topic of trust in society and how issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.41 (from 0.05 for Schneier o ... to 0.89 for Angewandte ...)

Alternative Names
Bruce Schneier Amerikaans wiskundige

Bruce Schneier crittografo e saggista statunitense

Bruce Schneier informaticien américain

Bruce Schneier US-amerikanischer Sachbuchautor und Kryptologe

Schneier, Bruce

Šnajer, Brus

Šneiers, Brūss, 1963-

Брус Шнайър

Брюс Шнайєр

Шнайер, Б 1963-

Шнайер, Брюс американский криптограф, писатель и специалист по компьютерной безопасности

ברוס שנייר

بروس اشنایر

브루스 슈나이어 미국의 컴퓨터 과학자

슈나이어, 브루스

シュナイアー, ブルース

ブルース・シュナイアー

布魯斯·施奈爾

Languages
Covers
Beyond fear : thinking sensibly about security in an uncertain worldLiars and outliers : enabling the trust that society needs to thrivePractical cryptographyThe electronic privacy papers : documents on the battle for privacy in the age of surveillanceE-mail security : how to keep your electronic messages privateSecrets and lies : digital security in a networked worldSchneier on securityCryptography engineering : design principles and practical applications