The following publications are possibly variants of this publication:
- Schneier on securityBruce Schneier. Wiley, 2008.
- The Speed of SecurityBruce Schneier. ieeesp, 1(4):96, 2003. [doi]
- Security and ComplianceBruce Schneier. ieeesp, 2(3):96, 2004. [doi]
- The psychology of securityBruce Schneier. CACM, 50(5):128, 2007. [doi]
- The Psychology of SecurityBruce Schneier. africacrypt 2008: 50-79 [doi]
- Managed Security Monitoring: Network Security for the 21st CenturBruce Schneier. compsec, 20(6):491-503, 2001.
- Security and Function CreepBruce Schneier. ieeesp, 8(1):88, 2010. [doi]
- Nonsecurity Considerations in Security DecisionsBruce Schneier. ieeesp, 5(3):88, 2007. [doi]
- Voting Security and TechnologyBruce Schneier. ieeesp, 2(1):84, 2004. [doi]
- Cryptography, Security, and the FutureBruce Schneier. CACM, 40(1):138, 1997.
- We Are All Security ConsumersBruce Schneier. ieeesp, 1(1):104, 2003. [doi]
- The Death of the Security IndustryBruce Schneier. ieeesp, 5(6):88, 2007. [doi]
- Security, Group Size, and the Human BrainBruce Schneier. ieeesp, 7(4):88, 2009. [doi]
- Hacking the Business Climate for Network SecurityBruce Schneier. Computer, 37(4):87-89, 2004. [doi]