Schneier on Security MP3 CD – 24 Jun 2014
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Customers who viewed this item also viewed
What other items do customers buy after viewing this item?
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
"...the timing of the release...could hardly be bettered...it′s certainly convenient to have [Schneier′s columns] collected in one place." (ZDNet.co.uk, October 22nd 2008)
"His conclusions are insightful and often provocative...A fascination read." (.Net, January 2008)
"...refreshing common–sense approach...indispensable for anyone in the security industry and a thought–provoking read for anyone else." (Information Age, November 2008)
"...an easy book to dip into...thought provoking, showing clear logic and real world examples...a highly accessible introduction to "security thinking"." (PC Pro, March 2009)
"Thought provoking and refreshingly honest, this is a fascinating reading...rivetingread throughout...A compelling digest" (Linux Format, April 2009)
"We could very well do with more Bruce Schneiers to advance that passionate cause for rational thinking" (Infosecurity, April 2009)-- Dieser Text bezieht sich auf eine andere Ausgabe: Hardcover.
From the Inside Flap
You take off your shoes in the airport. You scan the supermarket′s "preferred customer" card to get the sale price. You claw your way through tamper–resistant packaging for a couple of aspirin. You accept all these inconveniences in the name of security.
But are you any safer?
Bruce Schneier, arguably the world′s foremost authority on computer security, has explored security issues ranging from protecting your password to illegal wiretapping. This collection of Schneier′s best op–ed pieces, columns, and blog posts goes beyond technology, offering his insight into everything from the risk of identity theft (vastly overrated) to the long–range security threat of unchecked presidential power and the surprisingly simple way to tamper–proof elections. You′ll discover:
Why data mining will never protect us from terrorists
How your stone–age brain affects what you fear and what security measures you accept
Why computer security is fundamentally an economic problem
Whether you can really trust a Trusted Traveler
If sacrificing your privacy has made you more secure
Why refusing driver′s licenses to illegal immigrants actually reduces security
The industry power struggle over controlling your computer
Why we overestimate some risks and underestimate others
Why national ID cards won′t make us safer, only poorer
. . . and much more
This book will challenge your illusions of security at every level. Think it′s okay to give up your privacy if you′re doing nothing wrong? What happens when "wrong" gets redefined? How much power over your personal life are you willing to concede to the person you least want to see as president? What′s the acceptable trade–off between security and convenience?
In this ruthless, comprehensive, and thought–provoking analysis, Schneier shows us what we should be worrying about and how to get our national fingers off the panic button.-- Dieser Text bezieht sich auf eine andere Ausgabe: Hardcover. See all Product description
Top customer reviews
It is refreshing to see a commonsense perspective on technological and security matters. Schneier sets the scene right from the start in an introduction to say 'all security involves trade-offs'. The theme, summarising the entire book as it were, cuts across the various domains covered by the essays and in fact presents a very practical guiding principle for security researchers and practitioners.
Chapter 8 on the economics of security is my favourite. It covers an exciting intersection that has emerged between the two disciplines, economics and information security, one which explains why economic motivation is important if security is to improve. Chapter 5 on identity cards and chapter 9 on the psychology of security are other chapters that I enjoyed reading the most.
The author's writing style is captivating. Every essay is succinct, mostly focussing on a problem and bringing out the often subtle issues immediately. The author manages to express complex ideas in simple words and draws clear conclusions at the end of every essay.
For those teaching the subject, this book is full of interesting case studies and discussions to be shared amongst students. I would recommend bringing in such insightful perspectives into the curriculum so the professionals of tomorrow can learn from the mistakes of the past.
Think of this book as a form of Schneier's vast experience and intelligence distilled into little chunks of wisdom each conveying the message simply one by one. This is priceless.
The author rants on a bit like an IT version of Michael Moore, but neveretheless makes valid points when examining security in the light of reason and logic. I work in IT and welcome a questioning attitude - this book certainly helps you to question accepted methods of security.
The only minor criticism is that the chronology of the articles reproduced in the book jumps around a bit. However, this is a great volume to dip in and out of and is well worth a read.
Well written and engaging style. Book is essentially drawn from a series of blog posts written by the author over his many years of security (book is organized by topic, rather than date written).
Note the cyber security chapters are well well worth reading - though this is just a high level introduction to this very complex topic.
Moreover, despite covering so much ground and such diverse topics as airport screening and voting machines, it is difficult to quibble with anything Schneier writes: replete with pragmatism and insight, every essay articulates succinctly (and usually in less than a thousand words) what many of us feel intuitively about the constant battle for the feeling (the illusion?) of security. Of course, the fact that all of the material deals with similar issues and that the essays have been arranged by topic means that the "overlap" (p.vii) is extensive and there is a feeling of repetitiveness throughout: nonetheless, some of this work is so important that it should be required reading! Worthy of special mention are; Who Owns Your Computer (p.161 - 163), Cyberwar (p.218 - 220), and Computer and Information Security (p.227 - 230). More than any others, these three influential essays capture the essence of the ongoing privacy debate.
In summary, this is a superb introduction to security and how decisions designed to enhance our security often (usually!) curtail our liberty - as Schneier points out, "security is a trade-off" (p.vii), but any trade is better evaluated with a clear head and an informed opinion: that's what this book offers. You can find much (but not all) of this material online, but the collection provides a wonderful body of knowledge and a superb resource that deserves a wider audience than it will likely attract.
The pragmatic analysis of conventional security is brilliant if only most security analysts applied the same logic we would all be more secure. The book is well written and an enjoyable read.
I was expecting more Security information on computer security and I got a very broad view on security in general but was not disappointed.
You should read it as well if you want to know more about national, computer and personal security.
He touches on everything from house alarms and anti-virus use on your computer to industrial espionage.
Would you like to see more reviews about this item?