Applied Cryptography: Protocols, Algorithms and Source Code in CEbookApplied Cryptography: Protocols, Algorithms and Source Code in CbyBruce SchneierRating: 4 out of 5 stars4/5Save Applied Cryptography: Protocols, Algorithms and Source Code in C for later
Liars and Outliers: Enabling the Trust that Society Needs to ThriveEbookLiars and Outliers: Enabling the Trust that Society Needs to ThrivebyBruce SchneierRating: 4 out of 5 stars4/5Save Liars and Outliers: Enabling the Trust that Society Needs to Thrive for later
Secrets and Lies: Digital Security in a Networked WorldEbookSecrets and Lies: Digital Security in a Networked WorldbyBruce SchneierRating: 4 out of 5 stars4/5Save Secrets and Lies: Digital Security in a Networked World for later
Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About ThemEbookNot with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About ThembyRam Shankar Siva KumarRating: 0 out of 5 stars0 ratingsSave Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them for later
Carry On: Sound Advice from Schneier on SecurityEbookCarry On: Sound Advice from Schneier on SecuritybyBruce SchneierRating: 4 out of 5 stars4/5Save Carry On: Sound Advice from Schneier on Security for later
We Have Root: Even More Advice from Schneier on SecurityEbookWe Have Root: Even More Advice from Schneier on SecuritybyBruce SchneierRating: 5 out of 5 stars5/5Save We Have Root: Even More Advice from Schneier on Security for later
Security 2020: Reduce Security Risks This DecadeEbookSecurity 2020: Reduce Security Risks This DecadebyDoug HowardRating: 0 out of 5 stars0 ratingsSave Security 2020: Reduce Security Risks This Decade for later
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them BackAudiobookA Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them BackbyBruce SchneierRating: 4 out of 5 stars4/5Save A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back for later
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your WorldAudiobookData and Goliath: The Hidden Battles to Collect Your Data and Control Your WorldbyBruce SchneierRating: 4 out of 5 stars4/5Save Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World for later
Not with a Bug, But With a Sticker: Attacks on Machine Learning Systems and What to Do About ThemAudiobookNot with a Bug, But With a Sticker: Attacks on Machine Learning Systems and What to Do About ThembyHyrum AndersonRating: 5 out of 5 stars5/5Save Not with a Bug, But With a Sticker: Attacks on Machine Learning Systems and What to Do About Them for later
We Have Root: Even More Advice from Schneier on SecurityAudiobookWe Have Root: Even More Advice from Schneier on SecuritybyBruce SchneierRating: 5 out of 5 stars5/5Save We Have Root: Even More Advice from Schneier on Security for later
Liars and Outliers: Enabling the Trust that Society Needs to ThriveAudiobookLiars and Outliers: Enabling the Trust that Society Needs to ThrivebyBruce SchneierRating: 4 out of 5 stars4/5Save Liars and Outliers: Enabling the Trust that Society Needs to Thrive for later
Schneier on SecurityAudiobookSchneier on SecuritybyBruce SchneierRating: 4 out of 5 stars4/5Save Schneier on Security for later