Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 6 results:
  • RTF
  • EndNote XML
Filters: Author is Bruce Schneier  [Clear All Filters]
2016
Schneier, Bruce. The Internet of Things Talks About You Behind Your Back., 2016.
  • Google Scholar
  • RTF
  • EndNote XML
2004
Schneier, Bruce. Carry On: Sound Advice from Schneier on Security. Indianapolis, IN: John Wiley, 2004.
  • Google Scholar
  • RTF
  • EndNote XML
2000
Schneier, Bruce. Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
  • Google Scholar
  • RTF
  • EndNote XML
Schneier, Bruce. "Semantic Attacks: The Third Wave of Network Attacks." Crypto-Gram (2000).
  • Google Scholar
  • RTF
  • EndNote XML
1996
Schneier, Bruce. Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed. New York, NY: John Wiley & Sons, 1996.
  • Google Scholar
  • RTF
  • EndNote XML
1995
Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C . John Wiley & Sons, 1995.
  • Google Scholar
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Speaking to the conference of commandants of the African Union

read more >>

The website of the DRIVER project is officially launched

read more >>

Driver+ reports now accessible online

read more >>

The first publication to reach 500 downloads

read more >>

Scientific session for the anniversary of "IT for Security"

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -