Audiobook11 hours
Schneier on Security
Written by Bruce Schneier
Narrated by Ken Maxon
Rating: 4 out of 5 stars
4/5
()
About this audiobook
You take off your shoes in the airport. You scan the supermarket’s “preferred customer” card to get the sale price. You claw your way through tamper-resistant packaging for a couple of aspirin. You accept all these inconveniences in the name of security.
But are you any safer?
Bruce Schneier, arguably the world’s foremost authority on computer security, has explored security issues ranging from protecting your password to illegal wiretapping. This collection of Schneier’s best op-ed pieces, columns, and blog posts goes
beyond technology, offering his insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
You’ll discover:
• Why data mining will never protect us from terrorists
• How your stone-age brain affects what you fear and what security measures you accept
• Why computer security is fundamentally an economic problem
• Whether you can really trust a Trusted Traveler
• If sacrificing your privacy has made you more secure
• Why refusing driver’s licenses to illegal immigrants actually reduces security
• The industry power struggle over controlling your computer
• Why we overestimate some risks and underestimate others
• Why national ID cards won’t make us safer, only poorer
… and much more
This book will challenge your illusions of security at every level. Think it’s okay to give up your privacy if you’re doing nothing wrong? What happens when “wrong” gets redefined? How much power over your personal life are you willing to concede to the person you least want to see as president? What’s the acceptable trade-off between security and convenience?
In this ruthless, comprehensive, and thought-provoking analysis, Schneier shows us what we should be worrying about and how to get our national fingers off the panic button.
But are you any safer?
Bruce Schneier, arguably the world’s foremost authority on computer security, has explored security issues ranging from protecting your password to illegal wiretapping. This collection of Schneier’s best op-ed pieces, columns, and blog posts goes
beyond technology, offering his insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
You’ll discover:
• Why data mining will never protect us from terrorists
• How your stone-age brain affects what you fear and what security measures you accept
• Why computer security is fundamentally an economic problem
• Whether you can really trust a Trusted Traveler
• If sacrificing your privacy has made you more secure
• Why refusing driver’s licenses to illegal immigrants actually reduces security
• The industry power struggle over controlling your computer
• Why we overestimate some risks and underestimate others
• Why national ID cards won’t make us safer, only poorer
… and much more
This book will challenge your illusions of security at every level. Think it’s okay to give up your privacy if you’re doing nothing wrong? What happens when “wrong” gets redefined? How much power over your personal life are you willing to concede to the person you least want to see as president? What’s the acceptable trade-off between security and convenience?
In this ruthless, comprehensive, and thought-provoking analysis, Schneier shows us what we should be worrying about and how to get our national fingers off the panic button.
More audiobooks from Bruce Schneier
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Not with a Bug, But With a Sticker: Attacks on Machine Learning Systems and What to Do About Them Rating: 0 out of 5 stars0 ratingsLiars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 4 out of 5 stars4/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5
Related to Schneier on Security
Related audiobooks
Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 5 out of 5 stars5/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Cyber Privacy: Who Has Your Data and Why You Should Care Rating: 2 out of 5 stars2/5Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Rating: 4 out of 5 stars4/5Greatest Hackers in the History Rating: 4 out of 5 stars4/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5Biggest Cyber Crimes in the History Rating: 5 out of 5 stars5/5Spies, Lies, and Algorithms: The History and Future of American Intelligence Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth Rating: 4 out of 5 stars4/5Dark Data: Why What You Don’t Know Matters Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsPower to the People: How Open Technological Innovation is Arming Tomorrow's Terrorists Rating: 4 out of 5 stars4/5Habeas Data: Privacy vs. the Rise of Surveillance Tech Rating: 5 out of 5 stars5/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5
Security For You
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5COMPTIA NETWORK+: Tips and Tricks to Learn and Study about The CompTIA Network+ Certification from A-Z Rating: 0 out of 5 stars0 ratingsNavigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsTor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5
Reviews for Schneier on Security
Rating: 3.7692308 out of 5 stars
4/5
13 ratings0 reviews