Book Finder
    
 
> Computers & Internet > Digital Business & Culture > Internet Privacy
 

Practical Cryptography
Niels Ferguson, Bruce Schneier
0471223573
March 28, 2003
Paperback
·
 
Book Description
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for...


The Hundredth Window
Charles Jennings
0743254988
Apr 2003
Paperback
·
 
Book Review
If you use a computer and you surf the Web, the Internet's open architecture has made you visible to the world. So claims The Hundredth Window, Charles Jennings and Lori Fena's exposé on Internet security--or the lack thereof. Regardless of how you feel about privacy, though, this book can help you understand the risks of Internet use--plus convince you to take some precautions to minimize them.

The proverbial hundredth window represents the most vulnerable link in a system. It derives from an allegory relating castle windows to potential security holes. If even one out of a hundred windows is left open, security becomes compromised. Since the Internet maximizes information sharing (admittedly a largely beneficial enterprise) would-be big-time marketers and shady characters can--without trying all that hard--spy...



Who Controls the Internet : Illusions of a Borderless World
Jack L. Goldsmith
0195152662
March 2006
Hardcover
·
 
From Publishers Weekly
Is the Internet truly "flattening" the modern world? Will national boundaries crumble beneath the ever-increasing volume of Internet traffic? Goldsmith and Wu, both professors of law (Goldsmith at Harvard, Wu at Columbia), think not, and they present an impressive array of evidence in their favor. The authors argue national governments will continue to maintain their sovereignty in the age of the Internet, largely because of economics: e-businesses-even giants such as Yahoo, Google and eBay-need governmental support in order to function. When Yahoo, an American company, was tried in French court for facilitating the auctioning of Nazi paraphernalia in violation of French law, the company was eventually forced to comply with local laws or risk losing the ability to operate in France. As eBay grew into an Internet...


How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life
J. J. Luna
0312319061
March 2004
Hardcover
·
 
Book Description
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect yourself from these information predators by securing your vehicle and real estate ownership, your bank accounts, your business dealings, your computer files, your home address, and more.

J.J. Luna, a highly trained and experienced security consultant, shows you how to achieve the privacy you crave and deserve, whether you just want to shield yourself from casual scrutiny or take your life savings with you and disappearing without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and...


Database Nation (Hardback)
Simson Garfinkel
1565926536


·
 
Book Review
Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a decidedly unappealing scenario of how we have overlooked privacy with the advent of advanced technology.

According to Garfinkel, "technology is not privacy neutral." It leaves us with only two choices: 1) allow our personal data to rest in the public domain or 2) become hermits (no credit cards, no midnight video jaunts--you get the point).

Garfinkel's thoroughly researched and example-rich text explores the history of identification procedures; the computerization of ID systems; how and where data is collected,...



Internet Privacy for Dummies.
John Levine
0764508466
Aug 2002
Paperback
·
 
Review
"...a great book…to the authors credit...very good stuff..." (Micro Mart, 28 September 2002)

"...a typically high quality guide...comprehensive..." (PC Plus, December 2002)

"…an entertaining and informative to me…(PC Utilities, December 2002)

Titles about online privacy walk a fine line between warning of very real risks and fostering hysteria about unlikely or impossible scenarios. Internet Privacy succeeds admirably. Its balanced tone and practical advice on the protecting yourself and your computer from Internet-borne threats, ranging from virus infection to identify theft, make it useful to beginning to intermediate computer folk. It also includes valuable tips on preserving offline electronic privacy, carrying these protective practices into daily activities. Naked comes from...



Perspectives and Policies on ICT in Society : An IFIP TC9 (Computers and Society) Handbook (IFIP International Federation for Information Processing)
Jacques Berleur (Editor), Chrisanthi Avgerou (Editor)
0387255877
June 9, 2005
Hardcover
·
 
Book Description
Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) will bring about an inevitable transition from "industrial" to "information" or "knowledge-based" economies and societies.  It is assumed that all aspects of our economic and social lives, in both the public and private spheres, will be radically different from what they are today.  The World Summit on the Information Society (Geneva 2003 - Tunis 2005) shows the importance of a worldwide reflection on those topics.  Perspectives and Policies on ICT in Society explores the ICT policies of different nations and regions such as Africa, China, Europe, and India.  The authors assess the arguments surrounding the impending new age, as well as some of the more...


Privacy on the Line: The Politics of Wiretapping and Encryption
Whitfield Diffie
0262541009
February 1999
Paperback
·
 
Book Review
There was a time when cryptography--the making and breaking of secret codes--was of interest only to spies, diplomats, and the occasional eccentric. Those days are over, and the reason, as Diffie and Landau explain, is that secret codes have become the key to preserving traditional notions of privacy at a time when technology is rapidly altering the nature of human communication.

When the vast majority of conversations happened face to face, keeping them private was a simple matter of stepping away from the listening crowd. But the growing number of conversations that take place over easy-to-intercept phone lines and e-mail channels requires more sophisticated safeguards. Above all, it requires online encryption tools of the highest grade, and this book does a good job of explaining how these tools work, both in principle...



Computer and Internet Use on Campus
Constance S. Hawke
0787955167
Jan 2001
Paperback
·
 
Review
"A comprehensive, well-written, interesting, and informative guide to technology and Internet use on campus. Everyone—from administrators who oversee and manage computer networks, to faculty interested in distance learning, to student affairs officials trying to understand alleged infractions by students, to college attorneys seeking to understand the law—will find this book enormously helpful. Well chosen vignettes and examples, along with a list of recommendations and guidelines, help make this complicated arena of university life and law accessible to administrators, faculty, and attorneys working in it." —Barbara Lee, dean, School of Management and Labor Relations, Rutgers University

"An easy-to-use and cost-effective resource designed to educate faculty and administrators about the legal issues...



Web Privacy with P3P
Lorrie Faith Cranor
0596003714
September 23, 2002
Paperback
·
 
Book Description
Web site developers balance their need to collect information about users with their obligation to show respect for their users' privacy. The Platform for Privacy Preferences Project, or P3P, has emerged as a technology that may satisfy the wishes of both parties. Developed by the World Wide Web Consortium (W3C), P3P gives users more control over the amount of information they disclose about themselves as they browse the Web, and allows web sites to declare to browsers what sort of information they will request of users. The number of web developers using P3P continues to grow. P3P support is now built into the newest browsers, including Microsoft Internet Explorer, Netscape Navigator, and Mozilla. Web Privacy with P3P explains the P3P protocol and shows web site developers how to configure their sites...


The Complete Guide to E-Security
Michael Chesbro
0806522798
Oct 2001
Paperback
·
 


RTP: Audio and Video for the Internet
Colin Perkins
0672322498
June 2003
Hardcover
·
 
Book Description
Introduction This book describes the protocols, standards, and architecture of systems that deliver real-time voice, music, and video over IP networks, such as the Internet. These systems include voice-over-IP, telephony, teleconferencing, streaming video, and webcasting applications. The book focuses on media transport: how to deliver audio and video reliably across an IP network, how to ensure high quality in the face of network problems, and how to ensure that the system is secure. The book adopts a standards-based approach, based around the Real-time Transport Protocol (RTP) and its associated profiles and payload formats. It describes the RTP framework, how to build a system that uses that framework, and extensions to RTP for security and reliability. Many media codecs are suitable for use with RTP-;for...


The Center for Democracy and Technology and Internet Privacy in the U.S.
Joyce H. -S Li
0810844427
Aug 2003
Hardcover
·
 
Book Description
This informative work serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace. Li's in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy.


Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Steven Levy, Steven Levy
0140244328
January 15, 2002
Paperback
·
 
Book Review's Best of 2001
If the National Security Agency (NSA) had wanted to make sure that strong encryption would reach the masses, it couldn't have done much better than to tell the cranky geniuses of the world not to do it. Author Steven Levy, deservedly famous for his enlightening Hackers, tells the story of the cypherpunks, their foes, and their allies in Crypto: How the Code Rebels Beat the Government. From the determined research of Whitfield Diffie and Marty Hellman, in the face of the NSA's decades-old security lock, to the commercial world's turn-of-the-century embrace of encrypted e-commerce, Levy finds drama and intellectual challenge everywhere he looks. Although he writes, "Behind every great cryptographer, it seems, there is a driving pathology," his respect for the mathematicians and programmers who...


Code and Other Laws of Cyberspace
Lawrence Lessig
0465039138
June 2000
Paperback
·
 
Book Review
"We, the Net People, in order to form a more perfect Transfer Protocol..." might be recited in future fifth-grade history classes, says attorney Lawrence Lessig. He turns the now-traditional view of the Internet as an uncontrollable, organic entity on its head, and explores the architecture and social systems that are changing every day and taming the frontier. Code and Other Laws of Cyberspace is his well-reasoned, undeniably cogent series of arguments for guiding the still-evolving regulatory processes, to ensure that we don't find ourselves stuck with a system that we find objectionable. As the former Communist-bloc countries found, a constitution is still one of our best guarantees against the dark side of chaos; and Lessig promotes a kind of document that accepts the inevitable regulatory authority of both...


Online Privacy

0813802474
Nov 2006
Paperback
·
 


The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
Ronald L. Krutz, et al
0471413569


·
 
Book Review
The Certified Information Systems Security Professional (CISSP) rating is difficult to earn and rare in the marketplace, which means you're a valuable commodity if you've proven your skills by passing the exam. The CISSP Prep Guide, one of only a handful of books on its subject, does a good job of giving readers a feel for the scope of the test and the style of its questions. It's ideal for use either as a preliminary survey of the CISSP subject areas (the test's publisher and the authors of this book call them "domains") for relative newcomers to computer security, or as a pure study guide to help more experienced professionals zero in on the weak spots in their knowledge. Don't expect to do well on the CISSP exam having only read this book. You'll want to have some practical experience and some specialized...


Internet Galaxy: Reflections on the Internet, Business, and Society
Manuel Castells
0199255776
April 2003
Textbook Paperback
·
 
From Publishers Weekly
Castells, best known for his three-volume study The Information Age (Blackwell), an analysis of societal changes wrought by communications advances, trims that work to appeal to readers who were daunted by its 1,200 pages, $80 paperback price and ponderous prose. In this excellent, readable, nontechnical summary of the history, social implications and likely future of Internet business, Castells, professor of planning and of sociology at Berkeley, covers institutions like the World Wide Web Consortium, which "presides over the protocols and development" of the Web, and phenomena like the Internet's immense ability to simultaneously liberate and exclude. There are still too many sentences like "It is fair to say that most hackers live normal lives, at least as normal as most people, which does not necessarily mean...


The Identity Theft Protection Guide : Safeguard Your Family Protect Your Privacy Recover a Stolen Identity
Amanda Welsh
0312327099
September 2, 2004
Paperback
·
 
Book Description
PROTECTION PREVENTION REPAIR

Identity theft is the fastest-growing category of crime in the United States today, and dealing with privacy and identity issues has become an essential part of life in our modern society. Each chapter in The Identity Theft Protection Guide contains a self-quiz to identify personal areas of concern, information to help you "take action," and more.

This book shows you how to:
* Minimize the risk of identity theft
* React if your identity is stolen
* Obtain and repair credit and insurance reports, and more
* Deal with direct marketers, junk mailers, and telephone solicitors
* Stop surveillance from GPS devices and cell-phone cameras
* Keep your kids safe online
* And much more!

These valuable survival skills can no longer be considered...


Public Policy and the Internet
Mary J. Cronin
0817998926
Jan 2000
Paperback
·
 
Book Description
As we enter the twenty-first century, every opinion, interest, and lifestyle known to man seems to have found a home somewhere on the Internet. The new technology and the new form of commerce it has generated have opened up much debate about how to deal with traditional business issues: in particular, privacy, taxation, and contracts. In October 1999 a group of prominent executives, Hoover fellows, and academics met to discuss Internet public policy, focusing initially on privacy and taxation but then expanding the debate to include issues of contract and jurisdiction as well. Public Policy and the Internet presents the initial findings that framed those discussions and outlines proposals that should guide policymaking in the future. In "Privacy and Electronic Commerce," Mary J. Cronin surveys opinion and...


Consumer Reports Electronics Buying Guide 2006
Staff of Consumer Reports
0975538810
October 2005
Paperback
·
 
Book Description
Digital technology is touching all aspects of our lives from cell phones to digital cameras. Going digital can be exhilarating for some, but stressful for others. Deciding on the right digital product can be difficult when you look at all the choices that are available in the market place. The new edition of Consumers' Report Digital Buying Guide 2006 can guide consumers in selecting a digital product and easing their anxieties about their purchase. The experts provide hundreds of smart ways to:

" Save money and find the best values in computers, plasma televisions, cell phones, cameras, DVD players and more
" Get the right high speed Internet connection or go wireless
" Establish a communication link between your home computers (networking)
" Weeding out spam and protecting your computer from...


Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
0471253111


·
 
Book Review
Whom can you trust? Try Bruce Schneier, whose rare gift for common sense makes his book Secrets and Lies: Digital Security in a Networked World both enlightening and practical. He's worked in cryptography and electronic security for years, and has reached the depressing conclusion that even the loveliest code and toughest hardware still will yield to attackers who exploit human weaknesses in the users. The book is neatly divided into three parts, covering the turn-of-the-century landscape of systems and threats, the technologies used to protect and intercept data, and strategies for proper implementation of security systems. Moving away from blind faith in prevention, Schneier advocates swift detection and response to an attack, while maintaining firewalls and other gateways to keep out the amateurs.

Newcomers...



PGP: Pretty Good Privacy
Simson Garfinkel
1565920988
November 1994
Paperback
·
 
Book Review
If you're concerned about the security of personal information on your computer--or in your e-mail--get PGP using this book. Garfinkel's guide to PGP (Pretty Good Privacy) encryption software is a comprehensive guide to secure encryption for everyone and anyone. So much so that even Phil Zimmerman, who created PGP, said he learned new things from this book. But more than that, it takes you behind the scenes into the fascinating history and workings of the great intellectual adventure story of cryptography. This book is a fascinating read as well as a top-notch guide, and is needed now more than ever.

Book Description
Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to...


Privacy and Rights to the Visual
Jacques N. Catudal
0847687996
June 1999
Hardcover
·
 


Online Dating For Dummies (For Dummies Series)
Judith Silverstein
0764538152
November 2003
Paperback
·
 
Review
"...covers strategies for success, including how to choose an agency, respond to potential dates and cultivate a relationship on-line..." (Aberdeen Press & Journal, Dec 03)

Book Description
Chances are, you've heard about Internet dating from a friend, or an online banner ad has caught your eye. If you've given online dating a passing consideration, you may have some fears from all those graphic horror stories that jar your senses – and your sensibilities. Or you may think that meeting people via the Internet is only for the disenfranchised or socially unskilled.

From their own experiences, 20 million people can tell you otherwise. Online Dating For Dummies will get you off the fence and on the Internet dating path – with the skill...



Privacy and Rights to the Visual
Jacques N. Catudal
0847688003
June 1999
Paperback
·
 


Internet and Online Privacy
Andrew Frackman
097059707X
May 2002
Paperback
·
 
Drake Tempest, General Counsel, Qwest Communications International Inc.
"An objective and thoughtful study. Very useful for understanding privacy concerns and designing privacy practices in the internet world."

Debra A. Valentine, O'Melveny & Myers LLP, formerly General Counsel Federal Trade Commission
"Every business person and lawyer who needs an introduction to privacy law . . . will profit from reading this book."

See all Editorial Reviews


Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet
Robert Ellis Smith
0930072146
June 2000
Paperback
·
 
William Safire, columnist, The New York Times, December 30, 1999
"Robert Ellis Smith's expose of privacy invasion will be one of the sleeper best-selling books..."

Columbia University Privacy Expert Alan F. Westin
"A delightful read for everyone in business, government, the legal professions, and academia who wants historical insights."

See all Editorial Reviews


Security in Computing
Charles P. Pfleeger
0130355488
November 2002
Textbook Hardcover
·
 
Book Description
Preface to the Third Edition Every day, the news media give more and more visibility to the effects of computer security on our daily lives. For example, on a single day in June 2002, the Washington Post included three important articles about security. On the front page, one article described the possibility that a terrorist group was plotting to-;and actually could-;invade computer systems and destroy huge dams, disable the power grid, or wreak havoc with the air traffic control system. A second article, also on the front page, considered the potential loss of personal privacy as governments and commercial establishments begin to combine and correlate data in computer-maintained databases. Further back, a third article discussed yet another software flaw that could have widespread effect. Thus, computer...

  ©BookFinder USA LLC.
  All rights reserved.