WorldCat Identities

Schneier, Bruce 1963-

Overview
Works: 147 works in 630 publications in 9 languages and 18,777 library holdings
Genres: Conference papers and proceedings  Case studies  Informational works  Academic theses 
Roles: Author, Editor, wpr, Contributor, Creator, htt, Interviewee
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Bruce Schneier
Data and Goliath : the hidden battles to collect your data and control your world by Bruce Schneier( Book )

29 editions published between 2015 and 2016 in English and Japanese and held by 2,399 WorldCat member libraries worldwide

"Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we're offered. Governments use surveillance to discriminate, censor, and chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we've gained? Security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day."--Jacket
Secrets and lies : digital security in a networked world by Bruce Schneier( Book )

77 editions published between 2000 and 2015 in 8 languages and held by 2,271 WorldCat member libraries worldwide

"Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive. Pragmatic, interesting, and humorous, Schneier exposes the digital world and the realities of our networked society. He examines the entire system, from the reasons for technical insecurities to the minds behind malicious attacks. You'll be guided through the security war zone, and learn how to understand and arm yourself against the threats of our connected world." "Secrets and Lies offers the expert guidance you'll need to make the right choices about securing your digital self."--Jacket
Applied cryptography : protocols, algorithms, and source code in C by Bruce Schneier( Book )

63 editions published between 1993 and 2017 in English and Undetermined and held by 2,012 WorldCat member libraries worldwide

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover
Schneier on security by Bruce Schneier( )

21 editions published between 2008 and 2013 in English and Undetermined and held by 1,649 WorldCat member libraries worldwide

This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem, the industry power struggle over controlling your computer, and why national ID cards won't make us safer, only poorer. Schneier recognizes that the ultimate security risk is people and that many security paractices are, in fact, secuirty risks. -- From publisher description
Beyond fear : thinking sensibly about security in an uncertain world by Bruce Schneier( Book )

32 editions published between 2003 and 2013 in English and held by 1,512 WorldCat member libraries worldwide

Do we really need national ID cards? Is it a good idea for pilots to carry pistols? Schneier makes the complex topic of security easy to comprehend. Using Schneier's 5-point method for analyzing any kind of security solution, he shows the reader how to become a well-informed security consumer
Liars and outliers : enabling the trust that society needs to thrive by Bruce Schneier( )

19 editions published between 2012 and 2015 in English and Chinese and held by 1,454 WorldCat member libraries worldwide

In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows the unique role of trust in facilitating and stabilizing human society. He discusses why and how trust has evolved, why it works the way it does, and the ways the information society is changing everything. - Publisher
Click here to kill everybody : security and survival in a hyper-connected world by Bruce Schneier( Book )

12 editions published between 2018 and 2019 in English and held by 897 WorldCat member libraries worldwide

"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"--
Carry on : sound advice from Schneier on security by Bruce Schneier( )

12 editions published between 2013 and 2014 in English and held by 881 WorldCat member libraries worldwide

An anthology of more than 155 essays by the author on his assessments of security and technology; the psychological, human, business, and economic aspects of security; privacy and surveillance; crime, terrorism, spying, and war; liberty and law, and more. Discover why our computer security is a feudal system; how science fiction writers can affect homeland security; why profiling actually makes us less safe; the myth of the transparent society; Google's and Facebook's privacy illusion; why the FBI and CIA failed to connect the dots on the Boston Marathon bombers; the story behind the Stuxnet virus; who should really be in charge of cybersecurity; how the US enabled the Chinese hacking of Google; and why scanners and sensors are the wrong way to secure the subway system.--From book jacket
Cryptography engineering : design principles and practical applications by Tadayoshi Kohno( Book )

24 editions published between 2010 and 2015 in English and Undetermined and held by 621 WorldCat member libraries worldwide

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start
The electronic privacy papers : documents on the battle for privacy in the age of surveillance by Bruce Schneier( Book )

12 editions published between 1997 and 1998 in English and held by 561 WorldCat member libraries worldwide

This text looks at the increasing problem of maintaining privacy for both private individuals and companies, whilst governments attempt to guarantee access to electronic communications. It provides documents detailing initiatives and stategies in this area
Practical cryptography by Niels Ferguson( Book )

14 editions published between 2003 and 2006 in 3 languages and held by 542 WorldCat member libraries worldwide

<Readership: undergraduate; postgraduate; research, professional>
E-mail security : how to keep your electronic messages private by Bruce Schneier( Book )

15 editions published between 1995 and 2000 in English and held by 513 WorldCat member libraries worldwide

Privacy and electronic mail. The problem. Encryption. Key management. Authentication. Certificates. Keeping your private key private. Odds and ends. Patents, governments, and export laws. Achieving electronic-mail privacy. Requirements and features. Privacy enhanced mail (PEN). Pretty good privacy (PGP). Comparing PGP and PEM. Attacks against PGP and PEM. Pretty good privacy. Privacy enhanced mail
Fast software encryption : 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000 : proceedings by Gerhard Goos( Book )

20 editions published between 2000 and 2002 in English and held by 436 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Fast Software Encryption, FSE 2000, held in New York City, USA in April 2000. The 21 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The volume presents topical sections on stream-cipher cryptanalysis, new ciphers, AES cryptanalysis, block-cipher cryptanalysis, and theoretical work
Smart card research and applications : third international conference, CARDIS'98, Louvain-la-Neuve, Belgium, September 1998 : proceedings by CARDIS '98( Book )

23 editions published between 1998 and 2001 in English and held by 413 WorldCat member libraries worldwide

This volume constitutes the thoroughly refereed post-proceedings of the Third International Conference on Smart Card Research and Advanced Applications, CARDIS'98, held in Louvain-la-Neuve, Belgium in September 1998. The 35 revised full papers presented were carefully reviewed and updated for inclusion in this book. All current aspects of smart card research and applications development are addressed, in particular: Java cards, electronic commerce, efficiency, security (including cryptographic algorithms, cryptographic protocols, and authentication), and architecture
Economics of information security and privacy III by Bruce Schneier( )

11 editions published between 2012 and 2013 in English and held by 399 WorldCat member libraries worldwide

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
We have root : even more advice from Schneier on security by Bruce Schneier( )

5 editions published in 2019 in English and held by 355 WorldCat member libraries worldwide

"We Have Root is the latest collection of essays by security and privacy expert Bruce Schneier. He explores a wide range of cybersecurity, privacy, and real-world security issues that are as current as today's headlines. Written in clear and understandable terms, his essays explore the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Rather than addressing technology experts. Schneier directs his writings to leaders, voters, and consumers. He challenges non-technical readers to question the status quo to make better security decisions and investments. As the internet and other technologies have become commonplace and fundamental to society, it is necessary to understand how these work and how they affect our everyday world. Today, social media is essential to public discourse. The web is vital for commerce. Even more critically, the Internet now affects the world in a direct and physical manner. In the near future, the Internet will enable pervasive surveillance at unprecedented levels. The book's essays originally appeared in numerous publications, including the Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and others."--
Angewandte Kryptographie Protokolle, Algorithmen und Sourcecode in C by Bruce Schneier( Book )

22 editions published between 1995 and 2017 in 4 languages and held by 306 WorldCat member libraries worldwide

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography , the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security
Cryptographie appliquée : protocoles, algorithmes et codes sources en C by Bruce Schneier( Book )

12 editions published between 1994 and 2001 in French and English and held by 216 WorldCat member libraries worldwide

The twofish encryption algorithm : a 128-bit block cipher( Book )

7 editions published in 1999 in English and held by 171 WorldCat member libraries worldwide

A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: all aspects of Twofish's design and anatomy, twofish performance and testing results, step-by-step instructions on how to use it in your systems, and complete source code, in C, for implementing Twofish
Spotlight on Cloud : Public Interest Technology with Bruce Schneier by Bruce Schneier( Visual )

1 edition published in 2020 in English and held by 111 WorldCat member libraries worldwide

Information security, IoT safety, data privacy, algorithmic security and fairness, AI, biotech, the future of work-information technology is now a public policy issue. But while an understanding of the technology involved is fundamental to crafting good policy, there's little involvement of technologists in policy discussions. This isn't sustainable. We need public interest technologists: people from our fields helping craft policy and providing security to agencies and groups working in the broader public interest. We need them in government, at NGOs, teaching at universities, as part of the press, and inside private companies. This is increasingly critical to both public safety and overall social welfare In this Spotlight on Cloud , find out about the current state of public interest technology and to discover a way forward, for us individually and collectively for our field. Recorded on December 5, 2019. See the original event page for resources for further learning or watch recordings of other past events . O'Reilly Spotlight explores emerging business and technology topics and ideas through a series of one-hour interactive events. In live conversations, participants share their questions and ideas while hearing the experts' unique perspectives, insights, fears, and predictions for the future. In every edition of Spotlight on Cloud , you'll learn about the complex, ever-evolving world of the cloud. You'll discover how successful companies have adopted and embraced this massive network of shared information and how you can follow their lead to transform your organization and prepare for the Next Economy
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.37 (from 0.05 for Schneier o ... to 0.87 for Smart card ...)

Covers
Applied cryptography : protocols, algorithms, and source code in CSchneier on securityBeyond fear : thinking sensibly about security in an uncertain worldLiars and outliers : enabling the trust that society needs to thriveCryptography engineering : design principles and practical applicationsThe electronic privacy papers : documents on the battle for privacy in the age of surveillancePractical cryptographyE-mail security : how to keep your electronic messages private
Alternative Names
Bruce Schneier Amerikaans wiskundige

Bruce Schneier crittografo e saggista statunitense

Bruce Schneier informaticien américain

Bruce Schneier ríomheolaí Meiriceánach

Bruce Schneier US-amerikanischer Sachbuchautor und Kryptologe

Brüs Şnayer

Schneier, B, 1963-

Schneier, Bruce

Schneier, Bruce 1963-

Šnajer, Brus

Šneiers, Brūss, 1963-

Брус Шнайър

Брюс Шнайєр

Шнайер, Б 1963-

Шнайер, Брюс американский криптограф, писатель и специалист по компьютерной безопасности

ברוס שנייר

بروس اشنایر

بروسى ستشنير

브루스 슈나이어 미국의 컴퓨터 과학자

슈나이어, 브루스 1963-

シュナイアー, ブルース

シュナイアー, ブルース 1963-

ブルース・シュナイアー

布魯斯·施奈爾

Languages