Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000004125369 | JC596.2.U5 E44 1997 | Open Access Book | Book | Searching... |
Searching... | 30000005197540 | JC596.2.U5 E44 1997 | Open Access Book | Advance Management | Searching... |
On Order
Summary
Summary
A collection of previously unreleased documents dealing with privacy in the Information Age.
Trying to keep up with the advancements in cryptography and digital telephony, the government has advocated controversial new tools that will allow them to monitor electronic communications. On the other side of the spectrum, privacy advocates are vehemently opposed to any government monitoring whatsoever. This book is a carefully selected and annotated collection of documents from both the government and the industry, enabling readers to fully understand governmental policies and how these will impact individuals and companies involved with the Internet.
Author Notes
Bruce Schneier is a Fellow at the Berkman Center for Internet and Society at Harvard Law School and the CTO of Resilient Systems, Inc. He is a security expert and author of numerous books including Beyond Fear: Thinking Sensibly About Security in an Uncertain World, Carry On: Sound Advice from Schneier on Security, and Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World.
(Bowker Author Biography)
Reviews 1
Library Journal Review
This is not an academically neutral book on the subject of privacy. Both Schneier and Banisar are security and privacy advocates of long standing, and they like to refer to the information superhighway as the information "snooperhighway." Here, they have collected previously classified documents from both government and industry sources. Coverage includes digital wiretapping, E-mail security, cryptography, the National Security Administration's perspective on telecommunications, the clipper chip, softkey escrow, and much more. Recommended for all libraries. (c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
Table of Contents
Partial table of contents |
Privacy and the Information Snooperhighway |
Roadblocks on the Information Superhighway |
Wiretapping |
Overview of Wiretapping |
Lobbying for Surveillance: The Digital Telephony Proposal |
Digital Telephony: The Public Response |
Cryptography |
Cryptography: The Cure for the Common Bug |
The Battle for Control of Cryptography |
Early Skirmishes |
The Clipper Chip Proposal |
Clipping the Clipper: Public Response to Desktop Surveillance |
Putting the Genie Back in the Bottle: Export Controls on Cryptography |
Atom Bombs, Fighter Planes, Machines Guns, and Cryptography: Export Controls |
Big Brother as the Keeper of the Keys: Will the Government Take Over Crypto? |
Banning Cryptography |
Software Key Escrow |
Epilog |
Bibliography of Books and Articles on Wiretapping and Cryptography |
Index |