Books by Bruce Schneier

Cover of Data and Goliath

Data and Goliath

The Hidden Battles to Collect Your Data and Control Your World

We cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. But have we given up more than we’ve gained?

Read More →

Cover of Carry On

Carry On

Sound Advice from Schneier on Security

Bruce Schneier's second collection of op-ed pieces, columns, and blog posts features more than 160 commentaries on topics including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election.

Read More →

Cover of Liars and Outliers

Liars and Outliers

Enabling the Trust that Society Needs to Thrive

In this book, Bruce Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows how trust works and fails in social settings, communities, organizations, countries, and the world.

Read More →

Cover of Cryptography Engineering

Cryptography Engineering

Design Principles and Practical Applications

A fully updated version of the bestselling Practical Cryptography, this book will teach you how to build cryptographic protocols that work in the real world.

Read More →

Cover of Schneier on Security

Schneier on Security

This collection of op-ed pieces, columns, and blog posts goes beyond technology, offering insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.

Read More →

Cover of Practical Cryptography

Practical Cryptography

This book is about cryptography as it is used in real-world systems. It has been superseded by Cryptography Engineering.

Read More →

Cover of Beyond Fear

Beyond Fear

Thinking Sensibly about Security in an Uncertain World

Talking about security can lead to anxiety, panic, and dread... or cool assessments, common sense and practical planning.

Read More →

Cover of Secrets & Lies

Secrets & Lies

Digital Security in a Networked World

Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.

Read More →

Cover of The Electronic Privacy Papers

The Electronic Privacy Papers

Documents on the Battle for Privacy in the Age of Surveillance

A collection of previously unreleased documents dealing with privacy in the Information Age.

Read More →

Cover of Applied Cryptography

Applied Cryptography

Protocols, Algorithms, and Source Code in C

This second edition of the cryptography classic provides a comprehensive survey of modern cryptography.

Read More →

Cover of The Twofish Encryption Algorithm

The Twofish Encryption Algorithm

A 128-Bit Block Cipher

This book contains all the information in the initial Twofish submission and the first three Twofish tech reports, expanded and corrected.

Read More →

Cover of E-Mail Security

E-Mail Security

How to Keep Your Electronic Messages Private

Published in 1995, this guide to securing your e-mail is now of historical interest only.

Read More →

Cover of Protect Your Macintosh

Protect Your Macintosh

Published in 1994, this book is now of historical interest only.

Read More →

Cover of Applied Cryptography (1st Edition)

Applied Cryptography (1st Edition)

Published in 1993, this classic work on cryptography has been superseded by the second edition.

Read More →

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc.