Books by Bruce Schneier
The Hidden Battles to Collect Your Data and Control Your World
We cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. But have we given up more than we’ve gained?
Sound Advice from Schneier on Security
Bruce Schneier's second collection of op-ed pieces, columns, and blog posts features more than 160 commentaries on topics including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election.
Enabling the Trust that Society Needs to Thrive
In this book, Bruce Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows how trust works and fails in social settings, communities, organizations, countries, and the world.
Design Principles and Practical Applications
A fully updated version of the bestselling Practical Cryptography, this book will teach you how to build cryptographic protocols that work in the real world.
This collection of op-ed pieces, columns, and blog posts goes beyond technology, offering insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
This book is about cryptography as it is used in real-world systems. It has been superseded by Cryptography Engineering.
Thinking Sensibly about Security in an Uncertain World
Talking about security can lead to anxiety, panic, and dread... or cool assessments, common sense and practical planning.
Digital Security in a Networked World
Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.
Documents on the Battle for Privacy in the Age of Surveillance
A collection of previously unreleased documents dealing with privacy in the Information Age.
Protocols, Algorithms, and Source Code in C
This second edition of the cryptography classic provides a comprehensive survey of modern cryptography.
A 128-Bit Block Cipher
This book contains all the information in the initial Twofish submission and the first three Twofish tech reports, expanded and corrected.
How to Keep Your Electronic Messages Private
Published in 1995, this guide to securing your e-mail is now of historical interest only.
Applied Cryptography (1st Edition)
Published in 1993, this classic work on cryptography has been superseded by the second edition.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc.