A penny for your thoughts, a latte for your password
interactions - The art of prototyping
Agile development of secure web applications
ICWE '06 Proceedings of the 6th international conference on Web engineering
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Social engineering in information assurance curricula
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
Integrating security and usability into the requirements and design process
International Journal of Electronic Security and Digital Forensics
Adaptive spike detection for resilient data stream mining
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
A framework for reasoning about the human in the loop
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Social Engineering Techniques, Risks, and Controls
The EDP Audit, Control, and Security Newsletter
Security Patterns for Automated Continuous Auditing
Information Security Journal: A Global Perspective
Proceedings of the 4th ACM workshop on Quality of protection
Privacy is dead, get over it! Information privacy and the dream of a risk-free society
Information and Communications Technology Law
Back to the future: digital decision making
Information and Communications Technology Law
Secure Internet Voting Based on Paper Ballots
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Realization of E-University for distance learning
DIWEB'08 Proceedings of the 8th WSEAS international conference on Distance learning and web engineering
Realization of E-University for distance learning
WSEAS Transactions on Computers
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cross-organizational security - the service-oriented difference
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context
Wireless Personal Communications: An International Journal
Optimizing airline passenger prescreening systems with Bayesian decision models
Computers and Operations Research
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Information Sciences: an International Journal
Hi-index | 0.00 |
From the Publisher:Many of us, especially since 9/11, have become personally concerned about issues ofsecurity, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem- solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systemssome useful, others useless or worsethat we're being asked to submit to and pay for. Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively聟[a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto- Gram, one of the most widely read newsletters in the field of online security.