Электронная книга: Bruce Schneier «Bruce Schneier on Trust Set»
Save almost 25% on this two-book set from Bruce Schneier covering issues of social trust and security This set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Carry On: Sounds Advice from Schneier on Security. In Liars and Outliers, Schneier covers the topic of trust in society and how issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. Insightful and entertaining, the weaves together ideas from across the social and biological sciences to explain how society induces trust and how trust facilitates and stabilizes society. Carry On features more than 140 articles by Schneier, including more than twenty unpublished articles, covering such security issues as crime and terrorism, human security, privacy and surveillance, the psychology of security, security and technology, travel and security, and more. A two-book set from a renowned author, technologist, and security expert Covers such current topics as the Internet as surveillance state, Chinese cyberattackes, privacy and social networking, aviation security, and more Ideal for IT professionals, security and networking engineers, hackers, consultants, and technology vendors Together, these two books offer deep and practical insight into a wide range of security topics for professionals in technology fields, as well as anyone interested in the larger philosophical issues of security. Издательство: "John Wiley&Sons Limited (USD)"
ISBN: 9781118906767 электронная книга Купить за 2601.58 руб и скачать на Litres |
Другие книги автора:
Книга | Описание | Год | Цена | Тип книги |
---|---|---|---|---|
Liars and Outliers. Enabling the Trust that Society Needs to Thrive | In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга | ||
Cryptography Engineering. Design Principles and Practical Applications | The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга | ||
Carry On. Sound Advice from Schneier on Security | Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга | ||
Schneier on Security | Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга |
Bruce Schneier
infobox scientist
name = Bruce Schneier
birth_date = Birth date and age|1963|1|15|df=y
residence =
citizenship =
field =
work_institutions =
alma_mater =
known_for =
Bruce Schneier (born
Education
Originally from
Writings on cryptography
Schneier's "Applied Cryptography" is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic
However, Schneier now denounces his early success as a naive, mathematical, and
Writings on computer security and general security
In 2000, Schneier published "Secrets and Lies: Digital Security in a Networked World". In 2003, Schneier published "".
Schneier writes a freely available monthly Internet newsletter on computer and other security issues, "Crypto-Gram", as well as a security Other writing Schneier and his wife, Karen Cooper, write restaurant reviews for a number of Minneapolis papers, including the " Schneier and Cooper were nominated in 2000 for the Individual-i Schneier designed the "individual-i" symbol and released it into public domain to promote In popular culture Schneier's name appears in the Schneier is featured on the Everybody Loves Eric Raymond website in a parody of Publications * Schneier, Bruce. "Applied Cryptography", John Wiley & Sons, 1994. ISBN 0-471-59756-2 ee also * References External links * [http://www.schneier.com/ Personal website, Schneier.com] – includes [http://schneier.com/crypto-gram.html "Crypto-Gram" newsletter] and [http://schneier.com/blog/ "Schneier on Security" blog] Источник: Bruce Schneier
* Schneier, Bruce. "Protect Your Macintosh", Peachpit Press, 1994. ISBN 1-56609-101-2
* Schneier, Bruce. "E-Mail Security", John Wiley & Sons, 1995. ISBN 0-471-05318-X
* Schneier, Bruce. "Applied Cryptography", Second Edition, John Wiley & Sons, 1996. ISBN 0-471-11709-9
* Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels. "The Twofish Encryption Algorithm", John Wiley & Sons, 1996. ISBN 0-471-35381-7
* Schneier, Bruce; Banisar, David. "The Electronic Privacy Papers", John Wiley & Sons, 1997. ISBN 0-471-12297-1
* Schneier, Bruce. "Secrets and Lies: Digital Security in a Networked World", John Wiley & Sons, 2000. ISBN 0-471-25311-1
* Schneier, Bruce. "", Copernicus Books, 2003. ISBN 0-387-02620-7
* Ferguson, Niels; Schneier, Bruce. "
*
*
*
*
* [http://votingmachines.procon.org/viewsource.asp?ID=1175 Bruce Schneier] at [http://votingmachines.procon.org/ Voting Machines ProCon.org]
* [http://geekz.co.uk/schneierfacts humorous Bruce Schneier "facts"]
* [http://www.individual-i.com/ individual-i page]
См. также в других словарях:
Web of trust — For the internet security website, see WOT: Web of Trust. In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP compatible systems to establish the authenticity of the binding between a public key and its owner. Its… … Wikipedia
Electronic voting — Election technology Certification of voting machines Independent Testing Authority (ITA) NVLAP VVSG End to end auditable voting systems Help America Vote Act Independent verific … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… … Wikipedia
Pretty Good Privacy — Original author(s) Phil Zimmermann Developer(s) Phil Zimmermann Initial release In 1991 Written in Multi language … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia