Listen and read

Step into an infinite world of stories

  • Listen and read as much as you want
  • Over 400 000+ titles
  • Bestsellers in 10+ Indian languages
  • Exclusive titles + Storytel Originals
  • Easy to cancel anytime
Subscribe now
Details page - Device banner - 894x1036

Schneier on Security

3 Ratings

4

Duration
11H 18min
Language
English
Format
Category

Non-Fiction

You take off your shoes in the airport. You scan the supermarket’s “preferred customer” card to get the sale price. You claw your way through tamper-resistant packaging for a couple of aspirin. You accept all these inconveniences in the name of security.

But are you any safer?

Bruce Schneier, arguably the world’s foremost authority on computer security, has explored security issues ranging from protecting your password to illegal wiretapping. This collection of Schneier’s best op-ed pieces, columns, and blog posts goes beyond technology, offering his insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections. You’ll discover: • Why data mining will never protect us from terrorists • How your stone-age brain affects what you fear and what security measures you accept • Why computer security is fundamentally an economic problem • Whether you can really trust a Trusted Traveler • If sacrificing your privacy has made you more secure • Why refusing driver’s licenses to illegal immigrants actually reduces security • The industry power struggle over controlling your computer • Why we overestimate some risks and underestimate others • Why national ID cards won’t make us safer, only poorer … and much more

This book will challenge your illusions of security at every level. Think it’s okay to give up your privacy if you’re doing nothing wrong? What happens when “wrong” gets redefined? How much power over your personal life are you willing to concede to the person you least want to see as president? What’s the acceptable trade-off between security and convenience?

In this ruthless, comprehensive, and thought-provoking analysis, Schneier shows us what we should be worrying about and how to get our national fingers off the panic button.

© 2020 Recorded Books (Audiobook): 9781705007945

Release date

Audiobook: 3 September 2020

Others also enjoyed ...

  1. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  2. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  3. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  4. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  5. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  6. The Art of Deception: Controlling the Human Element of Security William L. Simon
  7. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  8. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  9. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  10. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  11. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  12. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  13. Cybersecurity For Dummies Joseph Steinberg
  14. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  15. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
  16. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  17. Cybercrime Investigators Handbook Graeme Edwards
  18. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  19. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  20. If It's Smart, It's Vulnerable Mikko Hypponen
  21. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  22. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  23. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  24. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  25. Data Science John D. Kelleher
  26. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  27. Cybersecutity First Principles Rick Howard
  28. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser
  29. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  30. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Kevin Mitnick
  31. The Dark Net Jamie Bartlett
  32. Breaking and Entering-The Extraordinary Story of a Hacker Called "Alien": The Extraordinary Story of a Hacker Called "Alien" Jeremy N. Smith
  33. Free Will Sam Harris
  34. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  35. Snowden's Box: Trust in the Age of Surveillance Dale Maharidge
  36. Artificial Intelligence For Dummies Luca Massaron
  37. Cyber Hacking: Wars in Virtual Space Scientific American
  38. Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Seth Stephens-Davidowitz
  39. Noise Daniel Kahneman
  40. Fooled by Randomness: The Hidden Role of Chance in Life and in the Markets Nassim Nicholas Taleb
  41. Data Science For Dummies: 2nd Edition Lillian Pierson
  42. The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman Richard P. Feynman
  43. America’s Secret War: Inside the Hidden Worldwide Struggle between America and its Enemies George Friedman
  44. To Catch a Spy: The Art of Counterintelligence James M. Olson
  45. Three Minutes to Doomsday: An Agent, a Traitor, and the Worst Espionage Breach in U.S. History Joe Navarro