Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 16,29

EUR 4,76 (23%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Beyond Fear: Thinking Sensibly About Security in an Uncertain World. par [Schneier, Bruce]
Publicité sur l'appli Kindle

Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Format Kindle

5.0 étoiles sur 5 1 commentaire client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 16,29

Longueur : 296 pages Word Wise: Activé Langue : Anglais

Descriptions du produit

Revue de presse

"Does arming pilots make flying safer? Computer security guru Schneier applies his analytical skills to real-world threats like terrorists, hijackers, and counterfeiters. BEYOND FEAR may come across as the dry, meticulous prose of a scientist, but that's actually Schneier's strength. Are you at risk or just afraid? Only by cutting away emotional issues to examine the facts, he says, will we reduce our risks enough to stop being scared." --Wired

"Schneier provides an interesting view of the notion of security, outlining a simple five-step process that can be applied to deliver effective and sensible security decisions. These steps are addressed in detail throughout the book, and applied to various scenarios to show how simple, yet effective they can be....Overall, this book is an entertaining read, written in layman's terms, with a diverse range of examples and anecdotes that reinforce the notion of security as a process." --Computing Reviews

"Schneier is a rare creature... Although he made his name as an alpha geek in cryptography... [he] can also speak to laypeople about the general security matters that increasingly touch all of our lives." --Business Week

Présentation de l'éditeur

Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves?

In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion.

With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits.

Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for.

Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively...¦[a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 3311 KB
  • Nombre de pages de l'édition imprimée : 296 pages
  • Editeur : Copernicus; Édition : 1st ed. 2003. Corr. 2nd printing 2006 (4 mai 2003)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B000PY3NB4
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5 1 commentaire client
  • Classement des meilleures ventes d'Amazon: n°255.967 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
Voir le commentaire client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Relié
Il est plus que regrettable que cet ouvrage de Bruce Schneier ne soit pas encore disponible en français !

Si B. Schneier s'est tout d'abord fait connaitre et reconnaitre comme un expert en matière de cryptographie, ses réflexions et pensées sur la sécurité d'une manière plus générale sont pleine de sagesse.

Ecrit au lendemain des attentats du 11 septembre, Beyond Fear incite et invite le lecteur à réfléchir au delà de ses peurs et à ne pas tout accepter au nom de la sacro-sainte sécurité.

Voici un ouvrage qui aurait tout autant sa place au rayon Philosophie qu'Informatique.
Remarque sur ce commentaire Une personne a trouvé cela utile. Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur (beta) HASH(0x9afb00c0) étoiles sur 5 60 commentaires
21 internautes sur 21 ont trouvé ce commentaire utile 
HASH(0x9a306c18) étoiles sur 5 Security or Liberty? Both! 29 juin 2005
Par takingadayoff - Publié sur
Format: Relié
I first read about Bruce Schneier in an eye-opening article by Charles Mann in the September, 2002 issue of The Atlantic Monthly. It seems that you don't have to make the false choice everyone is agonizing over between security and liberty. You can have both.

Schneier's book expands on the ideas in the article. Although Schneier is a technology fan and it is his livelihood, he realizes that sometimes a live security guard can provide better security than cutting-edge (but still fallible) face-recognition scanners, for instance. He explains why national ID cards are not a good idea, and how iris-scanners can be fooled.

These are ideas for security on a large scale, for airports, nuclear and other power plants, and government websites. For security on an individual or small business scale, try Art of the Steal by Frank Abagnale. But even if you don't run a government, Beyond Fear is a fascinating read about how your government is making choices (and how they SHOULD be making choices about your security and about your rights.
29 internautes sur 32 ont trouvé ce commentaire utile 
HASH(0x9a306d68) étoiles sur 5 Pragmatic advice 5 août 2003
Par Un client - Publié sur
Format: Relié
Bruce's greatest strength is in the role of Evangelist -- he translates the complex aspects of security into a vocabulary suitable for common consumption. If you're a sociologist, a risk management officer, or a cultural psychologist, you'll be familiar with a lot of the upstream references from which Bruce draws his examples. Conversely, if you're working in an office where "solving that security problem" is one of your many tasks, you won't have the time or inclination to dig out the esoteric sources. Consider this book as an alternative, far less onerous choice.
The book is easy reading -- it flows quickly and keeps returning to a common set of themes. These are set against many contexts so you're sure to find something familiar. You won't find any math or greek notation in here, to the disappointment of "Applied Cryptography" die-hards but the relief of everyone else.
The underlying message, seeing beyond the Fear, Uncertainty, and Doubt (FUD) propagated by mass media and the government, is a key one to understanding why it's OK to question this hyper-security-conscious world we find ourselves in. Airline security is an arena familiar to most business travelers, and we as passengers are expected not only to accept increasingly invasive measures, but welcome them without hesitation. Bruce teaches us how to evaluate the efficacy of these schemes both individually and in the aggregate. The results will surprise all but the most cynical among you.
That said, this is not the textbook of a conspiracy theorist. Bruce willingly admits that improving security correctly is a worthwhile pursuit, and even teaches us how to do it. You won't find the rantings of an ill-informed libertarian crackpot.
If your interests lead you to ask questions and be curious about the changes to your world in recent years, you will find this an entertaining and informative volume. Democrat or Republican, luddite or technology businessperson, it's worth a look at your earliest opportunity.
12 internautes sur 12 ont trouvé ce commentaire utile 
HASH(0x9a306e34) étoiles sur 5 Lots of very useful practical advice � and don't panic 21 janvier 2004
Par Keith Appleyard - Publié sur
Format: Relié
Not quite what I'd expected. I'd read & enjoyed 'Secrets & Lies', and I thought this would be more of the same. This book is really a discussion about what actions have been taken post 9/11, and in parts it's a criticism of the overreaction that there has been.
However, its not overtly political, and gives dozens (perhaps a 100) practical worked examples of good & bad, effective & ineffective, responses to security issues, whether it be physical, electronic etc.
There is a 5-step process which I found useful to apply to everyday situations; and (in highly abbreviated form) these are : what are you trying to protect; what are the risks; risk mitigation; risks caused by the solution; trade-offs
The core message is : "as both individuals and a society, we can make choices about our security", and this book helps you understand how to make those informed decisions.
13 internautes sur 14 ont trouvé ce commentaire utile 
HASH(0x9a306bd0) étoiles sur 5 Puts things into perspective 10 février 2005
Par Daniel Williams - Publié sur
Format: Relié
The title of the book refers to the steps to take after fear is sensed. To move beyond fear is to understand it, how it affects you and why, and what you can do about it. And that is what the book addresses - what things do we need to secure, from our personal interests, to national interests.

Schneier addresses this in the framework of a five questions to ask about security. Although the process seems crude, it does touch the heart of security issue - what are we trying to protect, why, and what happens if we don't protect it?

I particularly like his idea of brittle versus flexible security. When a brittle security system fails, you asset is screwed. A (poor) example would be burying your money in your back yard. If this is compromised (someone finds it), then you loose all your money, and that's the end of it. Compare this to a baking account. If someone robs the bank, or fraudulently takes your money, the bank is obliged to get you your money back. (So maybe you should bury your bank account number and password in yuor back yard!)

Although much of the discussion is on the level of national security, he also has gems of wisdom like suggesting that you leave the bathroom light on while you're away to deter burglars. And he points out yuor identity is more likely to be stolen from your discarded papers than from someone stealing your info on the internet.

I really appreciate the last part of the book where he lists the most-likely causes of death among Americans. What I got from that was not that I should avoid international airports, or dig a fallout shelter, but simply that I should make sure that I and my family are securely buckled up when we drive. Now that's putting 9/11 into perspective.
23 internautes sur 27 ont trouvé ce commentaire utile 
HASH(0x9a3094bc) étoiles sur 5 Very Good, and Not as Muddled as One has Claimed 19 octobre 2005
Par Amazon Customer - Publié sur
Format: Relié Achat vérifié
This book is very informative, interesting, and entertaining. I've recommended it to people both within and outside the CS and IT communities w/o reservation.

Rather than reiterating things said in the many positive reviews, I'd like to take issue with one reviewer who says Schneier misuses the term "threat." In particular, this reviewer says "A threat is a party with the capabilities and intentions to exploit a vulnerability in an asset." This definition is both counter to standard English usage and counter to standard usage within the computer security field. Every book on my shelf has roughly the same definition of threat: "Threat: a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability" -- Stallings, Network Security Essentials, p. 5. So a threat is condition or event, not a party. The reviewer seems to confuse threat with potential adversary.

Schneier's terminology is the standard terminology, and he uses it correctly.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique