Books by Bruce Schneier

Cover of A Hacker's Mind

A Hacker’s Mind

How the Powerful Bend Society’s Rules, and How to Bend them Back

It’s not just computers—hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world.

Read More →

Cover of We Have Root

We Have Root

Even More Advice from Schneier on Security

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues.

Read More →

Cover of Click Here to Kill Everybody

Click Here to Kill Everybody

Security and Survival in a Hyper-connected World

The internet is powerful, but it is not safe. As “smart” devices proliferate the risks will get worse, unless we act now.

Read More >

Cover of Data and Goliath

Data and Goliath

The Hidden Battles to Collect Your Data and Control Your World

We cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. But have we given up more than we’ve gained?

Read More >

Cover of Carry On

Carry On

Sound Advice from Schneier on Security

Bruce Schneier’s second collection of op-ed pieces, columns, and blog posts features more than 160 commentaries on topics including the Boston Marathon bombing, the NSA’s ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election.

Read More >

Cover of Liars and Outliers

Liars and Outliers

Enabling the Trust that Society Needs to Thrive

In this book, Bruce Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows how trust works and fails in social settings, communities, organizations, countries, and the world.

Read More >

Cover of Cryptography Engineering

Cryptography Engineering

Design Principles and Practical Applications

A fully updated version of the bestselling Practical Cryptography, this book will teach you how to build cryptographic protocols that work in the real world.

Read More >

Cover of Schneier on Security

Schneier on Security

This collection of op-ed pieces, columns, and blog posts goes beyond technology, offering insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.

Read More >

Cover of Practical Cryptography

Practical Cryptography

This book is about cryptography as it is used in real-world systems. It has been superseded by Cryptography Engineering.

Read More >

Cover of Beyond Fear

Beyond Fear

Thinking Sensibly about Security in an Uncertain World

Talking about security can lead to anxiety, panic, and dread… or cool assessments, common sense and practical planning.

Read More >

Cover of Secrets & Lies

Secrets & Lies

Digital Security in a Networked World

Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.

Read More >

Cover of The Electronic Privacy Papers

The Electronic Privacy Papers

Documents on the Battle for Privacy in the Age of Surveillance

A collection of previously unreleased documents dealing with privacy in the Information Age.

Read More >

Cover of Applied Cryptography

Applied Cryptography

Protocols, Algorithms, and Source Code in C

This second edition of the cryptography classic provides a comprehensive survey of modern cryptography.

Read More >

Cover of The Twofish Encryption Algorithm

The Twofish Encryption Algorithm

A 128-Bit Block Cipher

This book contains all the information in the initial Twofish submission and the first three Twofish tech reports, expanded and corrected.

Read More >

Cover of E-Mail Security

E-Mail Security

How to Keep Your Electronic Messages Private

Published in 1995, this guide to securing your e-mail is now of historical interest only.

Read More >

Cover of Protect Your Macintosh

Protect Your Macintosh

Published in 1994, this book is now of historical interest only.

Read More >

Cover of Applied Cryptography (1st Edition)

Applied Cryptography (1st Edition)

Published in 1993, this classic work on cryptography has been superseded by the second edition.

Read More >

Books Edited by Bruce Schneier

Cover of Economics of Information Security and Privacy III

Economics of Information Security and Privacy III

Selected papers from the 2011 Workshop on the Economics of Information Security (WEIS). WEIS is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science.

Read More on Springer.com >

Cover of Fast Software Encryption

Fast Software Encryption

Proceedings of the 7th International Workshop on Fast Software Encryption (FSE 2000).

Read More on Springer.com >

Cover of Smart Card Research and Applications

Smart Card Research and Applications

Proceedings of the Third International Smart Card Research and Advanced Application Conference (CARDIS 1998).

Read More on Springer.com >

Sidebar photo of Bruce Schneier by Joe MacInnis.