- Publisher: Springer-Verlag New York Inc.
- Format: Hardback | 296 pages
- Dimensions: 157mm x 236mm x 25mm | 567g
- Publication date: 4 May 2006
- Publication City/Country: New York, NY
- ISBN 10: 0387026207
- ISBN 13: 9780387026206
- Edition statement: 1st ed. 2003. Corr. 2nd printing 2006
- Illustrations note: 5 black & white tables, biography
- Sales rank: 190,138
Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for. Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively...|[a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.
Add item to wishlist
Other people who viewed this bought:
USD$16.50 - Save $2.20 11% off - RRP $18.70
USD$25.14 - Save $6.03 19% off - RRP $31.17
USD$10.21 - Save $5.37 34% off - RRP $15.58
USD$39.41 - Save $26.87 40% off - RRP $66.28
USD$34.14 - Save $23.55 40% off - RRP $57.69
USD$19.45 - Save $0.81 (3%) - RRP $20.26
Other books in this category
USD$31.83 - Save $16.50 34% off - RRP $48.33
USD$12.04 - Save $5.10 29% off - RRP $17.14
USD$20.99 - Save $2.39 10% off - RRP $23.38
USD$5.94 - Save $0.01 - RRP $5.95
USD$14.32 - Save $9.06 38% off - RRP $23.38
Bruce Schneier is the author of seven books, including Applied Cryptography which Wired called "the one book the National Security Agency wanted never to be published" and Secrets and Lies, described in Fortune as a "startlingly lively jewel box of little surprises you can actually use." He is also founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.
"Does arming pilots make flying safer? Computer security guru Schneier applies his analytical skills to real-world threats like terrorists, hijackers, and counterfeiters. BEYOND FEAR may come across as the dry, meticulous prose of a scientist, but that's actually Schneier's strength. Are you at risk or just afraid? Only by cutting away emotional issues to examine the facts, he says, will we reduce our risks enough to stop being scared." -- Wired "Schneier provides an interesting view of the notion of security, outlining a simple five-step process that can be applied to deliver effective and sensible security decisions. These steps are addressed in detail throughout the book, and applied to various scenarios to show how simple, yet effective they can be...Overall, this book is an entertaining read, written in layman's terms, with a diverse range of examples and anecdotes that reinforce the notion of security as a process." --Computing Reviews "Schneier is a rare creature... Although he made his name as an alpha geek in cryptography... [he] can also speak to laypeople about the general security matters that increasingly touch all of our lives." -- Business Week "Once again Schneier proves that he is the one of few people who indeed understands security, and what is more important and more difficult, can explain complex concepts to people not specializing in security. Whatever your trade and whatever your background, go ahead and read it ..." -- itsecurity.com "In his new book, 'Beyond Fear', Bruce Schneier -- one of the world's leading authorities on security trade-offs -- completes the metamorphosis from cryptographer to pragmatist that began with Secrets and Lies, published in 2000." -- infoworld.com
Table of contents
Sensible Security.- All Security Involves Trade-offs.- Security Trade-offs Are Subjective.- Security Trade-offs Depend on Power and Agenda.- How Security Works.- Systems and How They Fail.- Knowing the Attackers.- Attackers Never Change Their Tunes, Just Their Instruments.- Technology Creates Security Imbalances.- Security Is a Weakest-Link Problem.- Brittleness Makes for Bad Security.- Security Revolves Around People.- Detection Works Where Prevention Fails.- Detection Is Useless Without Response.- Identification, Authentication, and Authorization.- All Countermeasures Have Some Value, But No Countermeasure Is Perfect.- Fighting Terrorism.- The Game of Security.- Negotiating for Security.- Security Demystified.