All
All

'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt

572 KB | 3 files |  PDF

The increasing scale of society affects societal pressures in a number of ways, making failures more expensive and more onerous.

Security technologist Bruce Schneier interconnects concepts from biological and social sciences to describe how society engenders trust and security. Schneier shows how society suffers in the absence of trust, whether examining the microcosm of social settings between two people or the world at large.

The increase scale of society exerts social pressures in a number of ways, including the pressure of more people, increased complexity in the interaction among those people, increased technological intensity and increased inertia resistance to change.

This excerpt, “Technological Advances,” was reprinted by permission of John Wiley & Sons, Inc., and comes from Chapter 16 of “Liars and Outliers: Enabling the Trust That Society Needs to Thrive,” authored by Bruce Schneier, 2012.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Liars and Outliers Excerpt.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Wiley is a global publisher of print and electronic products, specializing in scientific, technical, medical and scholarly journals, encyclopedias, books, and online products and services; professional/trade books, subscription products, training materials, and online applications and websites; and educational materials for undergraduate and graduate students and lifelong learners.

All IT Downloads from John Wiley & Sons, Inc.» | Visit John Wiley & Sons, Inc. »
Related IT Downloads

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious URL intercepts, and the continuing rapid development of security. ...  More >>

Survey03 Interfaces for Personal Identity Verification

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity credentials. ...  More >>

Security7 Risk Management for Replication Devices

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date