Writings On Computer Security and General Security
In 1994, Schneier published "Applied Cryptography", which details the design, use, and implementation of cryptographic algorithms. More recently he published "Cryptography Engineering", which is focused more on how to use cryptography in real systems and less on its internal design. He has also written books on security for a broader audience. In 2000, Schneier published Secrets and Lies: Digital Security in a Networked World. In 2003, Schneier published Beyond Fear: Thinking Sensibly About Security in an Uncertain World.
Schneier writes a freely available monthly Internet newsletter on computer and other security issues, Crypto-Gram, as well as a security weblog, Schneier on Security. The weblog started out as a way to publish essays before they appeared in Crypto-Gram, making it possible for others to comment on them while the stories were still current, but over time the newsletter became a monthly email version of the blog, re-edited and re-organized. Schneier is frequently quoted in the press on computer and other security issues, pointing out flaws in security and cryptographic implementations ranging from biometrics to airline security after the September 11 attacks. He also writes "Security Matters", a regular column for Wired Magazine.
Schneier revealed on his blog that in the December 2004 issue of the SIGCSE Bulletin, three Pakistani academics, Khawaja Amer Hayat, Umar Waqar Anis, and S. Tauseef-ur-Rehman, from the International Islamic University in Islamabad, Pakistan, plagiarized an article written by Schneier and got it published. The same academics subsequently plagiarized another article by Ville Hallivuori on "Real-time Transport Protocol (RTP) security" as well. Schneier complained to the editors of the periodical, which generated a minor controversy. The editor of the SIGCSE Bulletin removed the paper from their website and demanded official letters of admission and apology. Schneier noted on his blog that International Islamic University personnel had requested him "to close comments in this blog entry"; Schneier refused to close comments on the blog, but he did delete posts which he deemed "incoherent or hostile".
Read more about this topic: Bruce Schneier
Famous quotes containing the words writings, computer, security and/or general:
“It has come to be practically a sort of rule in literature, that a man, having once shown himself capable of original writing, is entitled thenceforth to steal from the writings of others at discretion. Thought is the property of him who can entertain it; and of him who can adequately place it. A certain awkwardness marks the use of borrowed thoughts; but, as soon as we have learned what to do with them, they become our own.”
—Ralph Waldo Emerson (18031882)
“Family life is not a computer program that runs on its own; it needs continual input from everyone.”
—Neil Kurshan (20th century)
“If we could have any security against moods! If the profoundest prophet could be holden to his words, and the hearer who is ready to sell all and join the crusade, could have any certificate that to-morrow his prophet shall not unsay his testimony!”
—Ralph Waldo Emerson (18031882)
“You have lived longer than I have and perhaps may have formed a different judgment on better grounds; but my observations do not enable me to say I think integrity the characteristic of wealth. In general I believe the decisions of the people, in a body, will be more honest and more disinterested than those of wealthy men.”
—Thomas Jefferson (17431826)