News in the Category "Type"
Page 90 of 96
Book Review: Beyond Fear
The Bottom Line
This is an excellent addition to what seems to be an emerging genre of books—those about national security or the lack thereof. Bruce Schneier gives a plain-English and well thought out overview of the security measures that have been implemented since the 9/11 terrorist attacks. He points out that security and liberty are not mutually exclusive. I recommend this book for anyone. It is important that we, as citizens, understand these issues so we can make informed decisions.
Pros
- Excellent and timely information
- Non-techies and techies alike can understand this book…
Review of Beyond Fear
Security is a complex business. If you’re looking at the security of a computer network, for example, you can’t just look at the physical characteristics of the system. Humans help protect the system, and humans attack it. Yes, most humans aren’t clever enough to create their own attacks, but they can master the rudimentary skills required to go after the system using automated tools the innovators create.
But how do you evaluate a security system, whether it’s meant to protect a computer, an airport, or an individual? In Beyond Fear, security expert and founder of Counterpane Internet Security, Bruce Schneier advocates a five-part analytical framework:…
ITsec PEP Review of: Beyond Fear: Thinking Sensibly About Security in an Uncertain World
I am going to keep this review short. Schneier’s first book I read, Applied Cryptography (2nd edition), left me fascinated by the art and science of cryptography. Another Schneier book, Secrets & Lies, told things many were not inclined to share. Practical Cryptography (co-authored with Niels Ferguson) presented such a clear, practical, and down-to-earth view of cryptography that I thought anyone who is lucky enough to read the book and follow the advice is going to really understand cryptography in context. Now, Beyond Fear. If it can be said that Practical Cryptography followed Applied Cryptography, then Beyond Fear follows Secrets & Lies. Once again, Schneier manages to describe complex security concepts and interdependencies without a word of technical jargon, so loved by many pseudo-experts trying to disguise their lack of clear understanding. Once again Schneier advocates “understand before you act”, which seems not to match some governments’ approach to security – security in a wider sense. Once again Schneier proves he is the one of few people who indeed understand security, and what is more important and more difficult, that he can explain complex security concepts to people not specializing in security. Whatever your trade and whatever your background, go ahead and read it because security affects your life…
Security Vision: Bruce Schneier
Tech entrepreneur Bruce Schneier is one of America’s best-known computer security experts. His testimony before Congress helped defeat legal restrictions on cryptography sought by the FBI and the National Security Agency when an appellate court ruled in 1999 that crypto algorithms were a form of speech covered by the First Amendment.
Schneier co-founded security services company Counterpane Internet Security, where he serves as chief technologist. Arguing that constant vigilance, not technology, is the best defense against computer break-ins, Schneier believes security breaches are nonetheless fated to increase as networking systems become more complex…
Homeland Insecurity
A top expert says America's approach to protecting itself will only make matters worse. Forget "foolproof" technology—we need systems designed to fail smartly
- To stop the rampant theft of expensive cars, manufacturers in the 1990s began to make ignitions very difficult to hot-wire. This reduced the likelihood that cars would be stolen from parking lots—but apparently contributed to the sudden appearance of a new and more dangerous crime, carjacking.
- After a vote against management Vivendi Universal announced earlier this year that its electronic shareholder-voting system, which it had adopted to tabulate votes efficiently and securely, had been broken into by hackers. Because the new system eliminated the old paper ballots, recounting the votes—or even independently verifying that the attack had occurred—was impossible…
Secrets and Lies: Digital Security in a Networked World (Review)
“That is a good book to give to your boss so that his boss will see him reading it and think that he’s getting a clue,” said the geek beside me at the coffee shop where we were both working wirelessly.
”But to me, this book is just the right thing,” I answered. ”Look, Schneier not only covers all the bases, but he’s a very clear writer and he‘s witty to boot.”
“No code, no real book,” grumbled the geek.
”It is exactly his sticking to concepts that makes the book work for such a variety of readers. Look, you could give this book to someone who thinks that setting up a home firewall has made his cable-modem connected PC secure or to someone interested in being on top of security issues or even to someone who only surfs the net but wonders what dangers lurk there. None of them would be ill served. And all of them would be enlightened…
Three Minutes With Security Expert Bruce Schneier
Security expert pushes full disclosure, forcing vendors to admit and fix bugs quickly.
Bruce Schneier is founder and chief technology officer of Internet security firm Counterpane. He has written two books on cryptography and computer security, Secrets and Lies and Applied Cryptography, and is an outspoken critic of Microsoft and other software vendors that produce products that contain dangerous security holes. We spoke with him about who is responsible for software security flaws and what consumers can do about the growing problem.
PCW: Are there more security holes in software, or are we just getting better at finding them?…
REVIEW: Bruce Schneier, Secrets and Lies: Digital Security in a Networked World
Secrets and Lies has generated a great deal of interest in the security community this year. Much of this interest probably stems from the simple fact that it isn’t every day (or every year) that you get a general security book, written for the non-specialist, produced by a major name in the field. But one point seems to have been glossed over in the praise for this work. Schneier’s writing is lively, entertaining, and even playful throughout the entire book. Not only is this volume a realistic and useful view of the security enterprise, but it’s a lot of fun…
Video: Bruce Schneier Answers Questions
Bruce Schneier answered audience questions at the DEF CON hacking conference.
Secrets & Lies: Digital Security in a Networked World (Review)
If you think technology can solve your security problems, then you don’t understand the problems and you don ‘t understand the technology.
So sayeth Bruce Schneier, the guru in security systems circles. His statements are often blunt but he certainly backs them up with the right credentials. He authored one of the classic texts on cryptography (Applied Cryptography) and BLOWFISH , one of the most frequently used encryption algorithms used in business systems today. BLOWFISH is the algorithm used in the PRIMAR Security System. Although Schneier’s first book, …
Sidebar photo of Bruce Schneier by Joe MacInnis.