All
All

'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt

572 KB | 3 files |  PDF

The increasing scale of society affects societal pressures in a number of ways, making failures more expensive and more onerous.

Security technologist Bruce Schneier interconnects concepts from biological and social sciences to describe how society engenders trust and security. Schneier shows how society suffers in the absence of trust, whether examining the microcosm of social settings between two people or the world at large.

The increase scale of society exerts social pressures in a number of ways, including the pressure of more people, increased complexity in the interaction among those people, increased technological intensity and increased inertia resistance to change.

This excerpt, “Technological Advances,” was reprinted by permission of John Wiley & Sons, Inc., and comes from Chapter 16 of “Liars and Outliers: Enabling the Trust That Society Needs to Thrive,” authored by Bruce Schneier, 2012.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Liars and Outliers Excerpt.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Wiley is a global publisher of print and electronic products, specializing in scientific, technical, medical and scholarly journals, encyclopedias, books, and online products and services; professional/trade books, subscription products, training materials, and online applications and websites; and educational materials for undergraduate and graduate students and lifelong learners.

All IT Downloads from John Wiley & Sons, Inc.» | Visit John Wiley & Sons, Inc. »

Related IT Downloads

Approximate Matching: Definition and Terminology

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics. ...  More >>

Security3TN Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations

Transport Layer Security (TLS) provides mechanisms to protect sensitive data during electronic dissemination across networks. ...  More >>

CLoud1a Managing Risk and Security in Outsourcing IT Services

The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data