'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt

572 KB | 3 files |  PDF

The increasing scale of society affects societal pressures in a number of ways, making failures more expensive and more onerous.

Security technologist Bruce Schneier interconnects concepts from biological and social sciences to describe how society engenders trust and security. Schneier shows how society suffers in the absence of trust, whether examining the microcosm of social settings between two people or the world at large.

The increase scale of society exerts social pressures in a number of ways, including the pressure of more people, increased complexity in the interaction among those people, increased technological intensity and increased inertia resistance to change.

This excerpt, “Technological Advances,” was reprinted by permission of John Wiley & Sons, Inc., and comes from Chapter 16 of “Liars and Outliers: Enabling the Trust That Society Needs to Thrive,” authored by Bruce Schneier, 2012.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Liars and Outliers Excerpt.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Wiley is a global publisher of print and electronic products, specializing in scientific, technical, medical and scholarly journals, encyclopedias, books, and online products and services; professional/trade books, subscription products, training materials, and online applications and websites; and educational materials for undergraduate and graduate students and lifelong learners.

All IT Downloads from John Wiley & Sons, Inc.» | Visit John Wiley & Sons, Inc. »
Related IT Downloads

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ...  More >>

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ...  More >>

Security35.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.