"Does arming pilots make flying safer? Computer security guru Schneier applies his analytical skills to real-world threats like terrorists, hijackers, and counterfeiters. BEYOND FEAR may come across as the dry, meticulous prose of a scientist, but that's actually Schneier's strength. Are you at risk or just afraid? Only by cutting away emotional issues to examine the facts, he says, will we reduce our risks enough to stop being scared." --Wired
"Schneier provides an interesting view of the notion of security, outlining a simple five-step process that can be applied to deliver effective and sensible security decisions. These steps are addressed in detail throughout the book, and applied to various scenarios to show how simple, yet effective they can be....Overall, this book is an entertaining read, written in layman's terms, with a diverse range of examples and anecdotes that reinforce the notion of security as a process." --Computing Reviews
"Schneier is a rare creature... Although he made his name as an alpha geek in cryptography... [he] can also speak to laypeople about the general security matters that increasingly touch all of our lives." --Business Week
Bruce Schneier is the author of seven books, including the bestsellers 'Applied Cryptography' (1994, 1998) and 'Secrets and Lies' (2001). He is the Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes 'Crypto-Gram', one of the most widely read online security newsletters. Schneier is also a frequent commentator in the national and international media, including 'The New York Times', 'NPR', 'CNN', and 'The Wall Street Journal', and has testified on security policies before the United States Senate.
Non è necessario possedere un dispositivo Kindle. Scarica una delle app Kindle gratuite per iniziare a leggere i libri Kindle sul tuo smartphone, tablet e computer.
Per scaricare una app gratuita, inserisci il numero di cellulare.
DaStephen Northcuttil 3 aprile 2008 - Pubblicato su Amazon.com
I was pretty excited to read Bruce Schneier's Beyond Fear, I have enjoyed hearning him speak and like his blog. I will say that the book could have said what it says with a lot less pages, possibly even an essay. However, there are lots of great stories and a fantastic word picture called "Security Theater". His illustration is that after 9/11 no one knew what to do to combat air terrorism, so they gave the appearance of action by doing things like confiscating nail files. Oh do I agree that much of what we see is security theater!
Bruce has a five step process he tries to illustrate, especially in the second half of the book:
* What assets are you trying to protect? * What are the risks to these assets? ( I think threats is a more correct word than risks ) * How well does the security solution mitigate those risks? * What other risks does the security solution cause? * What trade-offs does the security solution require?
This is a nice implementation of threat vector analysis and he tells great stories. I am not sure the book teaches that much, but it might be a valuable awareness tool for executives.
DaC. Baileyil 22 giugno 2013 - Pubblicato su Amazon.com
The summarization of the book that led me to purchase turned out to be a bit misleading. While the author received much of his experience as a security specialist in computer science, very little of this book has to do with computer science directly. Instead the focus is painfully on protection from terrorism and crime. At times even belittling the horrors and reducing them to mere improbabilities. The book was longer than it needed to be. There are a few good tips and views, but are mostly lost in the expansiveness of the book.
5,0 su 5 stelleAgain, Schneier makes security understandable.
DaJustin B.il 6 novembre 2011 - Pubblicato su Amazon.com
Bruce Schneier is well-known for his book Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, and bringing the concept of cryptography down to be understood by mere mortals. A cryptographer by trade, in the last decade, he has focused on more practical impediments to security. In Beyond Fear, he focuses on practical security measures, largely in the context of air travel in a post-9/11 world. With simple, concrete, and logical examples (and indeed an complete security process), he explains how security tradeoffs are driven by specific agendas, and that increased security in one area usually leads to overlooked or weakened security in another area. He lays out well-considered arguments for the need for what he calls "security theatre" (the APPEARANCE of good security vs. ACTUAL good security), and how we make our own security tradeoffs every day, based on our understanding of risks - which may be completely flawed based on statistics.
At its core, though, Beyond Fear explains how a system can never be 100% safe, and our desire to have a system that is impervious to attack is often driven by an emotional need, and not based on logic, fact, and rational analysis - and is often at odds with our desire for personal freedoms, which is often what we're seeking to secure. It offers hope, however, that by understanding the real risks we face, we're able to make smart, individual tradeoffs about our personal safety and security - preserving both our liberty and personal safety.
It's a fantastic book, if you have any interest in security or the security-freedom tradeoff. It's well-written, simple to understand, engaging, and direct. At points, Schneier gets a little preachy about personal freedom, but his agenda will likely resound with most readers. His personal commentary is short-lived, however, and for the vast majority of the book, it's a well-balanced, rational analysis of our system's strengths and weaknesses, and our individual roles in it.
5,0 su 5 stelleAn encyclopedia of knowledge, written for non-tech people
DaKeith Tokashil 31 ottobre 2003 - Pubblicato su Amazon.com
"Anyone who tries to entice you with promises of absolute security or safety is pandering to your fears" (pg 277). This whole book is filled with common-sense and not-so-common-sense thinking. I had the opportunity to see Schneier speak at Toorcon 2003 in San Diego and I can tell you this guy not only knows as much as anyone about security, he also talks *like a normal person*. He's not arrogant, he doesn't throw in gratuitous latin terms, he just makes a very clear point with extremely strong logic to back it up. That's what this book is: a handbook on how to logically sift through all the garbage that's trickling down to us via the US media and our govt. Does the FBI need expanded snooping powers? Not according to Schneier, who backs that up with facts regarding 9-11 that tell us the right govt agencies *had* the info, they just couldn't analyze it all. So giving up a bunch of our privacy for the FBI to get more info doesn't make much sense in combating terrorism. This is just one example in dozens. You may not even agree (I've met a few FBI people and they ALWAYS say they need more power/info), but reading this book allows you to pull the emotion out of security-based decisions, whether they are about home alarm systems or airport security lines. For people who aren't familiar with Schneier, he is basically a semi-legend in the information security field for his cryptography, writing and speaking. His last book, "Secrets & Lies", broadened the scope of his writing from crypto to general infosec. Now he has broadened his focus even further to include the physical world (beyond the server room). To be honest he doesn't really even bring up computers directly that often, and when he does he usually tells us that they aren't nearly as good at making security decisions as people. Seasoned infosec people won't be surprised by any of the logic or conclusions in this book, but it's still worth a read because Schneier has obviously spent a lot of his brain's cycles thinking about security in general and we can all benefit from his conclusions. Schneier has won my respect with this book. It proves that not only does he get the security details (the crypto), he gets the "big picture", even when the big picture has nothing to do with computing (eg muggings). It is rare to find this in one company, let alone one person.
Iscriviti ad Amazon Prime: consegne senza costi aggiuntivi in 1 giorno su 2 milioni di prodotti e in 2-3 giorni su molti altri milioni, accesso anticipato alle Offerte Lampo di Amazon.it e spazio di archiviazione per le foto illimitato