Get 2 top 10 audiobooks free with a LoveReading exclusive

LoveReading has teamed up with Audiobooks.com to give you the chance to get 2 free audiobooks when you sign up. Try it for 30 days for free with no strings attached. You can cancel anytime, although we're sure you'll love it. Click the button to find out more:

Find out more

Bruce Schneier - Author

About the Author

Books by Bruce Schneier

Click Here to Kill Everybody Security and Survival in a Hyper-connected World

Click Here to Kill Everybody Security and Survival in a Hyper-connected World

Author: Bruce Schneier Format: Hardback Release Date: 04/09/2018

We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the World-Sized Web . It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else's. Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out common-sense policies that will allow us to enjoy the benefits of this new omnipotent age without surrendering ourselves entirely to our creation.

Data and Goliath The Hidden Battles to Collect Your Data and Control Your World

Data and Goliath The Hidden Battles to Collect Your Data and Control Your World

Author: Bruce Schneier Format: Paperback / softback Release Date: 08/02/2016

Data is everywhere. We create it every time we go online, turn our phone on (or off) or pay with a credit card. This data is stored, studied, bought and sold by companies and governments for surveillance and for control. Foremost security expert (Wired) Bruce Schneier shows how this data has led to a double-edged Internet-a Web that gives power to the people but is abused by the institutions on which those people depend. In Data and Goliath, Schneier reveals the full extent of surveillance, censorship and propaganda in society today, examining the risks of cybercrime, cyberterrorism and cyberwar. He shares technological, legal and social solutions that can help shape a more equal, private and secure world.

Applied Cryptography Protocols, Algorithms and Source Code in C

Applied Cryptography Protocols, Algorithms and Source Code in C

Author: Bruce Schneier Format: Hardback Release Date: 01/12/2015

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published... -Wired Magazine ...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers . .. -Dr. Dobb's Journal ...easily ranks as one of the most authoritative in its field. -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Secrets and Lies Digital Security in a Networked World

Secrets and Lies Digital Security in a Networked World

Author: Bruce Schneier Format: Hardback Release Date: 13/03/2015

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library. -Business Week Startlingly lively...a jewel box of little surprises you can actually use. -Fortune Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect. -Business 2.0 Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words. -The Economist Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible. -Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.

Data and Goliath The Hidden Battles to Collect Your Data and Control Your World

Data and Goliath The Hidden Battles to Collect Your Data and Control Your World

Author: Bruce Schneier Format: Hardback Release Date: 02/03/2015

Data is everywhere. We create it every time we go online, turn our phone on (or off) or pay with a credit card. This data is stored, studied, bought and sold by companies and governments for surveillance and for control. Foremost security expert (Wired) Bruce Schneier shows how this data has led to a double-edged Internet-a Web that gives power to the people but is abused by the institutions on which those people depend. In Data and Goliath, Schneier reveals the full extent of surveillance, censorship and propaganda in society today, examining the risks of cybercrime, cyberterrorism and cyberwar. He shares technological, legal and social solutions that can help shape a more equal, private and secure world.

Economics of Information Security and Privacy III

Economics of Information Security and Privacy III

Author: Bruce Schneier Format: Paperback / softback Release Date: 15/10/2014

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

Bruce Schneier on Trust Set

Bruce Schneier on Trust Set

Author: Bruce Schneier Format: Hardback Release Date: 21/12/2013

Save almost 25% on this two-book set from Bruce Schneier covering issues of social trust and securityThis set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Carry On: Sounds Advice from Schneier on Security. In Liars and Outliers, Schneier covers the topic of trust in society and how issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. Insightful and entertaining, the weaves together ideas from across the social and biological sciences to explain how society induces trust and how trust facilitates and stabilizes society. Carry On features more than 140 articles by Schneier, including more than twenty unpublished articles, covering such security issues as crime and terrorism, human security, privacy and surveillance, the psychology of security, security and technology, travel and security, and more. A two-book set from a renowned author, technologist, and security expert Covers such current topics as the Internet as surveillance state, Chinese cyberattackes, privacy and social networking, aviation security, and more Ideal for IT professionals, security and networking engineers, hackers, consultants, and technology vendors Together, these two books offer deep and practical insight into a wide range of security topics for professionals in technology fields, as well as anyone interested in the larger philosophical issues of security.

Carry On Sound Advice from Schneier on Security

Carry On Sound Advice from Schneier on Security

Author: Bruce Schneier Format: Hardback Release Date: 06/12/2013

Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that are valuable for security experts and ordinary citizens alike. * Bruce Schneier's worldwide reputation as a security guru has earned him more than 250,000 loyal blog and newsletter readers * This anthology offers Schneier's observations on some of the most timely security issues of our day, including the Boston Marathon bombing, the NSA's Internet surveillance, ongoing aviation security issues, and Chinese cyber-attacks * It features the author's unique take on issues involving crime, terrorism, spying, privacy, voting, security policy and law, travel security, the psychology and economics of security, and much more * Previous Schneier books have sold over 500,000 copies Carry On: Sound Advice from Schneier on Security is packed with information and ideas that are of interest to anyone living in today's insecure world.

Economics of Information Security and Privacy III

Economics of Information Security and Privacy III

Author: Bruce Schneier Format: Hardback Release Date: 25/09/2012

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. Economics of Information Security and Privacy III addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

Liars and Outliers Enabling the Trust that Society Needs to Thrive

Liars and Outliers Enabling the Trust that Society Needs to Thrive

Author: Bruce Schneier Format: Hardback Release Date: 27/01/2012

In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows the unique role of trust in facilitating and stabilizing human society. He discusses why and how trust has evolved, why it works the way it does, and the ways the information society is changing everything.

Introduction to Security and Applied Cryptography

Introduction to Security and Applied Cryptography

Author: Bruce Schneier, Michael T. Goodrich, Roberto Tamassia Format: Paperback Release Date: 24/05/2005

This reference provides an overview of applied cryptography protocols and algorithms in a precise and easy-to-follow treatment Covering a good breadth of cryptography algorithms, protocols, and applications, the book shares necessary details and the most up-to-date coverage of this important topic Includes applications of cryptography, including information authentication, public-key infrastructure, file encryption, broadcast encryption, e-voting, digital rights management, network security (IPSEC, VPNs, TLS, SSH), XML signatures, and mobile & wireless security

Secrets and Lies Digital Security in a Networked World

Secrets and Lies Digital Security in a Networked World

Author: Bruce Schneier Format: Paperback / softback Release Date: 16/01/2004

Bestselling author, Bruce Schneier offers his expert guidance on achieving security on a network. Internationally recognized computer security expert, Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. This book walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs. It explains what cryptography can and can't do in achieving digital security.

Beyond Fear Thinking Sensibly About Security in an Uncertain World

Beyond Fear Thinking Sensibly About Security in an Uncertain World

Author: Bruce Schneier Format: Hardback Release Date: 28/07/2003

Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for. Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called the one book the National Security Agency wanted never to be published ) and Secrets and Lies (described in Fortune as startlingly lively...|[a] jewel box of little surprises you can actually use. ). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.

Applied Cryptography Protocols, Algorithms, and Source Code in C

Applied Cryptography Protocols, Algorithms, and Source Code in C

Author: Bruce Schneier Format: Paperback / softback Release Date: 18/10/1995

...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published... -Wired Magazine ...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers ... -Dr. Dobb's Journal ...easily ranks as one of the most authoritative in its field. -PC Magazine ...the bible of code hackers. -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? New information on the Clipper Chip, including ways to defeat the key escrow mechanism New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher The latest protocols for digital signatures, authentication, secure elections, digital cash, and more More detailed information on key management and cryptographic implementations

NEW INDIE AND SELF PUBLISHED BOOK REVIEW AND PROMOTION SERVICE LAUNCHED!    Read More
×