Muutke küpsiste eelistusi

E-raamat: We Have Root - Even More Advice from Schneier on Security: Even More Advice from Schneier on Security [Wiley Online]

(Counterpane Internet Security, Minneapolis, Minnesota)
  • Formaat: 304 pages
  • Ilmumisaeg: 08-Oct-2019
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 111965355X
  • ISBN-13: 9781119653554
Teised raamatud teemal:
  • Wiley Online
  • Hind: 21,14 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 304 pages
  • Ilmumisaeg: 08-Oct-2019
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 111965355X
  • ISBN-13: 9781119653554
Teised raamatud teemal:

A collection of popular essays from security guru Bruce Schneier 

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.

Bruce’s writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired,  and many others. And now you can enjoy his essays in one place—at your own speed and convenience.

• Timely security and privacy topics

• The impact of security and privacy on our world

• Perfect for fans of Bruce’s blog and newsletter

• Lower price than his previous essay collections

The essays are written for anyone who cares about the future and implications of security and privacy for society.

Introduction xi
1 Crime, Terrorism, Spying, and War
1(24)
Cyberconflicts and National Security
1(3)
Counterterrorism Mission Creep
4(3)
Syrian Electronic Army Cyberattacks
7(1)
The Limitations of Intelligence
8(3)
Computer Network Exploitation vs. Computer Network Attack
11(2)
iPhone Encryption and the Return of the Crypto Wars
13(3)
Attack Attribution and Cyber Conflict
16(3)
Metal Detectors at Sports Stadiums
19(2)
The Future of Ransomware
21(4)
2 Travel and Security
25(6)
Hacking Airplanes
25(3)
Reassessing Airport Security
28(3)
3 Internet of Things
31(42)
Hacking Consumer Devices
31(1)
Security Risks of Embedded Systems
32(4)
Samsung Television Spies on Viewers
36(2)
Volkswagen and Cheating Software
38(3)
DMCA and the Internet of Things
41(2)
Real-World Security and the Internet of Things
43(4)
Lessons from the Dyn DDoS Attack
47(3)
Regulation of the Internet of Things
50(3)
Security and the Internet of Things
53(16)
Botnets
69(1)
IoT Cybersecurity: What's Plan B?
70(3)
4 Security and Technology
73(16)
The NSA's Cryptographic Capabilities
73(3)
iPhone Fingerprint Authentication
76(2)
The Future of Incident Response
78(3)
Drone Self-Defense and the Law
81(2)
Replacing Judgment with Algorithms
83(4)
Class Breaks
87(2)
5 Elections and Voting
89(10)
Candidates Won't Hesitate to Use Manipulative Advertising to Score Votes
89(2)
The Security of Our Election Systems
91(2)
Election Security
93(3)
Hacking and the 2016 Presidential Election
96(3)
6 Privacy and Surveillance
99(56)
Restoring Trust in Government and the Internet
99(3)
The NSA Is Commandeering the Internet
102(2)
Conspiracy Theories and the NSA
104(2)
How to Remain Secure against the NSA
106(4)
Air Gaps
110(4)
Why the NSA's Defense of Mass Data Collection Makes No Sense
114(3)
Defending Against Crypto Backdoors
117(4)
A Fraying of the Public/Private Surveillance Partnership
121(2)
Surveillance as a Business Model
123(2)
Finding People's Locations Based on Their Activities in Cyberspace
125(3)
Surveillance by Algorithm
128(4)
Metadata = Surveillance
132(1)
Everyone Wants You to Have Security, But Not from Them
133(3)
Why We Encrypt
136(1)
Automatic Face Recognition and Surveillance
137(4)
The Internet of Things that Talk about You behind Your Back
141(2)
Security vs. Surveillance
143(2)
The Value of Encryption
145(3)
Congress Removes FCC Privacy Protections on Your Internet Usage
148(2)
Infrastructure Vulnerabilities Make Surveillance Easy
150(5)
7 Business and Economics of Security
155(14)
More on Feudal Security
155(3)
The Public/Private Surveillance Partnership
158(2)
Should Companies Do Most of Their Computing in the Cloud?
160(5)
Security Economics of the Internet of Things
165(4)
8 Human Aspects of Security
169(20)
Human-Machine Trust Failures
169(2)
Government Secrecy and the Generation Gap
171(2)
Choosing Secure Passwords
173(4)
The Human Side of Heartbleed
177(2)
The Security of Data Deletion
179(1)
Living in a Code Yellow World
180(2)
Security Design: Stop Trying to Fix the User
182(2)
Security Orchestration and Incident Response
184(5)
9 Leaking, Hacking, Doxing, and Whistleblowing
189(40)
Government Secrets and the Need for Whistleblowers
189(4)
Protecting Against Leakers
193(2)
Why the Government Should Help Leakers
195(2)
Lessons from the Sony Hack
197(3)
Reacting to the Sony Hack
200(3)
Attack Attribution in Cyberspace
203(2)
Organizational Doxing
205(2)
The Security Risks of Third-Party Data
207(3)
The Rise of Political Doxing
210(1)
Data Is a Toxic Asset
211(4)
Credential Stealing as an Attack Vector
215(1)
Someone Is Learning How to Take Down the Internet
216(2)
Who Is Publishing NSA and CIA Secrets, and Why?
218(4)
Who Are the Shadow Brokers?
222(4)
On the Equifax Data Breach
226(3)
10 Security, Policy, Liberty, and Law
229(52)
Our Newfound Fear of Risk
229(3)
Take Back the Internet
232(2)
The Battle for Power on the Internet
234(7)
How the NSA Threatens National Security
241(3)
Who Should Store NSA Surveillance Data?
244(3)
Ephemeral Apps
247(2)
Disclosing vs. Hoarding Vulnerabilities
249(5)
The Limits of Police Subterfuge
254(2)
When Thinking Machines Break the Law
256(2)
The Democratization of Cyberattack
258(2)
Using Law against Technology
260(3)
Decrypting an iPhone for the FBI
263(2)
Lawful Hacking and Continuing Vulnerabilities
265(2)
The NSA Is Hoarding Vulnerabilities
267(4)
WannaCry and Vulnerabilities
271(4)
NSA Document Outlining Russian Attempts to Hack Voter Rolls
275(2)
Warrant Protections against Police Searches of Our Data
277(4)
References 281
Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of over one dozen books as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and his blog "Schneier on Security" are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org; and a special advisor to IBM Security.