Author: Keith Martin
Publisher: Oxford University Press
Release Date: 2017-06-08
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.
Author: Steven Levy
Release Date: 2001-01-08
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
The paperback version of the groundbreaking book about the next generation of computers: not only are they smaller—they're alive. Cells, gels, and DNA strands are the "wetware" of the twenty-first century. Imagine taking cells from a cancer patient and programming them to detect disease and then prompt the body to cure itself. Or clothes woven with microchips, nanofibers, and living cells to form wearable bio-weapons detection systems. Both of these revolutionary applications are closer than we think. Some scientists are pushing the boundaries even further by creating synthetic biology where brand new creatures are engineered in the laboratory. In this breathtaking book, a leading expert in the field reveals just how the stuff of science fiction is rapidly becoming a reality. This new technology will change the way we think—not just about computers, but about the nature of life itself.
Author: Arthur Meier Schlesinger
Publisher: Houghton Mifflin Harcourt
Release Date: 2004
The presidential historian charts the progression of American power from George Washington to George W. Bush, revealing the exercise of power through the office as it has developed into an "imperial" seat of authority, in an updated edition of the classic history. Reprint.
Author: Keith Jeffery
Release Date: 2010-09-21
The authorized history of the world's oldest and most storied foreign intelligence service, drawing extensively on hitherto secret documents Britain's Special Intelligence Service, commonly called MI6, is not only the oldest and most storied foreign intelligence unit in the world - it is also the only one to open its archives to an outside researcher. The result, in this authorized history, is an unprecedented and revelatory look at an organization that essentially created, over the course of two world wars, the modern craft of spying. Here are the true stories that inspired Ian Fleming's James Bond's novels and John le Carré George Smiley novels. Examining innovations from invisible ink and industrial-scale cryptography to dramatic setbacks like the Nazi sting operations to bag British operatives, this groundbreaking history is as engrossing as any thriller - and much more revealing. "Perhaps the most authentic account one will ever read about how intelligence really works." -The Washington Times From the Trade Paperback edition.
Author: James Rickards
Release Date: 2012
Genre: Business & Economics
Currency wars are one of the most destructive and feared outcomes in international economics. At best, they offer the sorry spectacle of countries stealing growth from their trading partners. At worst, they degenerate into sequential bouts of inflation, recession, retaliation and sometimes actual violence. Left unchecked the next currency war could lead to a crisis worse than the panic of 2008.The next crash is overdue. Recent headlines about the Eurozone crisis, the bailouts for Greece, riots caused by austerity measures as well as the debasement of the dollar.
“A prescient and important book. . . . Fascinating.”—The New York Review of Books No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn’t so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. Klimburg is a leading voice in the conversation on the implications of this dangerous shift, and in The Darkening Web, he explains why we underestimate the consequences of states’ ambitions to project power in cyberspace at our peril: Not only have hacking and cyber operations fundamentally changed the nature of political conflict—ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war—but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today—and with it the very existence of open and democratic societies. Blending anecdote with argument, Klimburg brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War—and quite possibly as dangerous for humanity as a whole. Authoritative, thought-provoking, and compellingly argued, The Darkening Web makes clear that the debate about the different aspirations for cyberspace is nothing short of a war over our global values.
A TV tie-in edition of The Code Book filmed as a prime-time five-part Channel 4 series on the history of codes and code-breaking and presented by the author. This book, which accompanies the major Channel 4 series, brings to life the hidden history of codes and code breaking. Since the birth of writing, there has also been the need for secrecy. The story of codes is the story of the brilliant men and women who used mathematics, linguistics, machines, computers, gut instinct, logic and detective work to encrypt and break these secrect messages and the effect their work has had on history.
The award-winning New York Times bestseller about the American women who secretly served as codebreakers during World War II--a "prodigiously researched and engrossing" (New York Times) book that "shines a light on a hidden chapter of American history" (Denver Post). Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them. A strict vow of secrecy nearly erased their efforts from history; now, through dazzling research and interviews with surviving code girls, bestselling author Liza Mundy brings to life this riveting and vital story of American courage, service, and scientific accomplishment.
Author: Josh Dean
Release Date: 2017-09-05
An incredible true tale of espionage and engineering set at the height of the Cold War—a mix between The Hunt for Red October and Argo—about how the CIA, the U.S. Navy, and America’s most eccentric mogul spent six years and nearly a billion dollars to steal the nuclear-armed Soviet submarine K-129 after it had sunk to the bottom of the Pacific Ocean; all while the Russians were watching. In the early hours of February 25, 1968, a Russian submarine armed with three nuclear ballistic missiles set sail from its base in Siberia on a routine combat patrol to Hawaii. Then it vanished. As the Soviet Navy searched in vain for the lost vessel, a small, highly classified American operation using sophisticated deep-sea spy equipment found it—wrecked on the sea floor at a depth of 16,800 feet, far beyond the capabilities of any salvage that existed. But the potential intelligence assets onboard the ship—the nuclear warheads, battle orders, and cryptological machines—justified going to extreme lengths to find a way to raise the submarine. So began Project Azorian, a top-secret mission that took six years, cost an estimated $800 million, and would become the largest and most daring covert operation in CIA history. After the U.S. Navy declared retrieving the sub “impossible,” the mission fell to the CIA's burgeoning Directorate of Science and Technology, the little-known division responsible for the legendary U-2 and SR-71 Blackbird spy planes. Working with Global Marine Systems, the country's foremost maker of exotic, deep-sea drilling vessels, the CIA commissioned the most expensive ship ever built and told the world that it belonged to the reclusive billionaire Howard Hughes, who would use the mammoth ship to mine rare minerals from the ocean floor. In reality, a complex network of spies, scientists, and politicians attempted a project even crazier than Hughes’s reputation: raising the sub directly under the watchful eyes of the Russians. The Taking of K-129 is a riveting, almost unbelievable true-life tale of military history, engineering genius, and high-stakes spy-craft set during the height of the Cold War, when nuclear annihilation was a constant fear, and the opportunity to gain even the slightest advantage over your enemy was worth massive risk.
Author: Stephen Budiansky
Release Date: 2016
A sweeping, in-depth history of NSA, whose famous "cult of silence" has left the agency shrouded in mystery for decades The National Security Agency was born out of the legendary codebreaking programs of World War II that cracked the famed Enigma machine and other German and Japanese codes, thereby turning the tide of Allied victory. In the postwar years, as the United States developed a new enemy in the Soviet Union, our intelligence community found itself targeting not soldiers on the battlefield, but suspected spies, foreign leaders, and even American citizens. Throughout the second half of the twentieth century, NSA played a vital, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. In Code Warriors, Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how NSA came to be, from its roots in World War II through the fall of the Berlin Wall. Along the way, he guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. With access to new documents, Budiansky shows where the agency succeeded and failed during the Cold War, but his account also offers crucial perspective for assessing NSA today in the wake of the Edward Snowden revelations. Budiansky shows how NSA's obsession with recording every bit of data and decoding every signal is far from a new development; throughout its history the depth and breadth of the agency's reach has resulted in both remarkable successes and destructive failures. Featuring a series of appendixes that explain the technical details of Soviet codes and how they were broken, this is a rich and riveting history of the underbelly of the Cold War, and an essential and timely read for all who seek to understand the origins of the modern NSA.
An analysis of how "cypherpunk" innovators of the digital generation are safeguarding individual anonymity while sharing institutional secrets for public use chronicles the activities of such controversial figures as Julian Assange and Daniel Domscheit-Berg.
Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age. How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more. An essential introduction to the new technologies of digital currency Covers the history and mechanics of Bitcoin and the block chain, security, decentralization, anonymity, politics and regulation, altcoins, and much more Features an accompanying website that includes instructional videos for each chapter, homework problems, programming assignments, and lecture slides Also suitable for use with the authors' Coursera online course Electronic solutions manual (available only to professors)
Author: Gordon Corera
Publisher: Open Road Media
Release Date: 2013-01-08
“A wide-ranging, thought-provoking, and highly readable history of Britain’s postwar Secret Intelligence Service, popularly known as MI6.” ―The Wall Street Journal From Berlin to the Congo, from Moscow to the back streets of London, these are the true stories of the agents on the front lines of British intelligence. And the truth is sometimes more remarkable than the spy novels of Ian Fleming or John le Carré. Gordon Corera provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. He tells the story of how the secret service has changed since the end of the World War II and, by focusing on the real people and the relationships that lie at the heart of espionage, illustrates the danger, the drama, the intrigue, and the moral ambiguities that come with working for British intelligence. From the defining period of the early Cold War through modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organization to its modern, no less controversial, incarnation. And some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied, and in some cases nearly died in service of the state. They range from the spymasters to the agents they controlled to their sworn enemies, and the result is a “fast-paced” examination that ranges “from the covert diplomacy of the Cold War to recent security concerns in Afghanistan and the Middle East” (The Times, London).