| title | media type | | ISBN-13 | year of publica- tion | other author(s) |
| Angewandte Kryptographie - Der Klassiker. Protokolle, Algorithmen und Sourcecode in C | Gebunden | | 978-3-8273-7228-4 | 2005 |
| Angewandte Kryptographie . Protokolle, Algorithmen und Sourcecode in C | " | | 978-3-89319-854-2 | 1996 |
| Applied Cryptography | Taschenbuch | | 978-9971-5-1348-1 | 1995 |
| Applied Cryptography: Protocols, Algorithms and Source Code in C | Hardcover | | 978-1-119-09672-6 | 2015 |
| Applied Cryptography: Protocols, Algorithms, and Source Code in C | Paperback | | 978-81-265-1368-0 | 2007 |
| Applied Cryptography: Protocols, Algorithms, and Source Code in C | " | | 978-0-471-11709-4 | 1996 |
| Applied Cryptography: Protocols, Algorithms, and Source Code in C | Hardcover | | 978-0-471-12845-8 | 1995 |
| Applied Cryptography: Protocols, Algorithms, and Source Code in C | Paperback | | 978-0-471-59756-8 | 1993 |
| Beyond Fear: Thinking Sensibly About Security in an Uncertain World. | Hardcover | | 978-0-387-02620-6 | 2003 |
| Bruce Schneier on Trust Set | " | | 978-1-118-90683-5 | 2014 |
| Carry On: Sound Advice from Schneier on Security | " | | 978-1-118-79081-6 | 2013 |
| Click Here to Kill Everybody: Security and Survival in a Hyper-connected World | " | | 978-0-393-60888-5 | 2018 |
| Crittografia pratica | Copertina flessibile | | 978-88-503-2168-1 | 2005 | Niels Ferguson |
| Cryptographie appliquée | Broché | | 978-2-7117-8676-3 | 2017 |
| Cryptographie appliquée | " | | 978-2-84180-036-0 | 1996 |
| Cryptographie: Sécurité de l'information et des systèmes | " | | 978-2-7117-4820-4 | 2017 | Niels Ferguson |
| Cryptography Engineering: Design Principles and Practical Applications | Paperback | | 978-0-470-47424-2 | 2010 | Niels Ferguson · Tadayoshi Kohno |
| Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World | " | | 978-0-393-35217-7 | 2016 |
| Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World | Hardcover | | 978-0-393-24481-6 | 2015 |
| Data und Goliath - Die Schlacht um die Kontrolle unserer Welt: Wie wir uns gegen Überwachung, Zensur und Datenklau wehren müssen | Gebunden | | 978-3-86881-596-2 | 2015 |
| Economics of Information Security and Privacy III | Paperback | | 978-1-4939-0036-7 | 2014 |
| Economics of Information Security and Privacy III | Hardcover | | 978-1-4614-1980-8 | 2012 |
| E-mail Security: How to Keep Your Electronic Messages Private | Paperback | | 978-0-471-05318-7 | 1995 |
| Fast Software Encryption: 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings | Taschenbuch | | 978-3-540-41728-6 | 2008 |
| Il manuale della crittografia. Applicazioni pratiche dei protocolli crittografici | Copertina flessibile | | 978-88-503-3065-2 | 2011 | Niels Ferguson · Tadayoshi Kohno |
| Introduction to Security and Applied Cryptography | Paperback | | 978-0-471-70309-9 | 2008 | Michael T. Goodrich · Roberto Tamassia |
| Kryptografia dla praktykow | Gebunden | | 978-83-204-2678-6 | 2009 |
| Liars and Outliers | MP3 CD | | 978-1-5012-6394-1 | 2015 |
| Liars and Outliers: Enabling the Trust that Society Needs to Thrive | " | | 978-1-4805-9010-6 | 2014 |
| Liars and Outliers: Enabling the Trust that Society Needs to Thrive | Hardcover | | 978-1-118-14330-8 | 2012 |
| Ochrona poczty elektronicznej | Taschenbuch | | 978-83-204-1979-5 | 1996 |
| Practical Cryptography | Paperback | | 978-0-471-22357-3 | 2003 | Niels Ferguson |
| Practical Cryptography | Hardcover | | 978-0-471-22894-3 | 2003 | " |
| Protect Your Macintosh | Paperback | | 978-1-56609-101-5 | 1994 |
| Schneier on Security | Hardcover | | 978-0-470-39535-6 | 2008 |
| Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography | Paperback | | 978-0-470-22626-1 | 2007 |
| Secrets & Lies | Taschenbuch | | 978-3-89864-302-3 | 2004 |
| Secrets & Lies: IT-Sicherheit in einer vernetzten Welt | " | | 978-3-527-50128-1 | 2004 |
| Secrets & Lies: IT-Sicherheit in einer vernetzten Welt | Gebunden | | 978-3-527-50021-5 | 2001 |
| "Secrets & Lies. IT-Sicherheit in einer vernetzten Welt" | " | | 978-3-89864-113-5 | 2001 |
| Secrets and Lies: Digital Security in a Networked World | Hardcover | | 978-1-119-09243-8 | 2015 |
| Secrets and Lies: Digital Security in a Networked World | Paperback | | 978-0-471-45380-2 | 2004 |
| Secrets and Lies: Digital Security in a Networked World | Hardcover | | 978-0-471-25311-2 | 2000 |
| Secrets et mensonges: Sécurité numérique dans un monde en réseau | Broché | | 978-2-7117-8684-8 | 2017 |
| Security Practitioner and Cryptography Handbook and Study Guide Set | Paperback | | 978-1-119-07154-9 | 2014 | Michael Gregg |
| Security Savvy: A Visual Guide | " | | 978-0-7645-7974-5 | |
| Smart Card. Research and Applications: Third International Conference, CARDIS'98 Louvain-la-Neuve, Belgium, September 14-16, 1998 Proceedings | Taschenbuch | | 978-3-540-67923-3 | 2008 | Jean-Jacques Quisquater |
| The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance | Hardcover | | 978-0-471-12297-5 | 1997 | David Banisar |
| The Twofish Encryption Algorithm | Paperback | | 978-0-387-98713-2 | 1999 | Chris Hall · John Kelsey · David Wagner · Doug Whiting |
| Twofish Encryption Algorithm: A 128-Bit Block Cipher | Hardcover | | 978-0-471-35381-2 | 1999 | Doug Whiting · David Wagner · Chris Hall · Niels Ferguson · John Kelsey |
暗号の秘密とウソ angounohimitsutouso | 単行本 | | 978-4-88135-996-9 | 2001 | ブルース・シュナイアー |
暗号技術大全 angougijutsudaizen/taizen | " | | 978-4-7973-1911-8 | 2003 | ブルース・シュナイアー · 山形 浩生 |