000 -LEADER | |
---|---|
fixed length control field | a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220104b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780367642488 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 323.448 |
Item number | JAR |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Jarvis, Craig |
245 ## - TITLE STATEMENT | |
Title | Crypto wars : the fight for privacy in the digital age : a political history of digital encryption |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | CRC Press, |
Date of publication, distribution, etc | 2020 |
Place of publication, distribution, etc | Boca Raton : |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvii, 422 p. ; |
Other physical details | ill., |
Dimensions | 24 cm |
365 ## - TRADE PRICE | |
Price amount | 26.99 |
Price type code | GBP |
Unit of pricing | 104.60 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age—an age when such liberties have an outsized influence on the citizen–State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies—its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen–State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Privacy, Right of |
Topical term or geographic name as entry element | Data encryption |
Topical term or geographic name as entry element | Computer science |
Topical term or geographic name as entry element | Political aspects |
Topical term or geographic name as entry element | Law and legislation |
Topical term or geographic name as entry element | American Civil Liberties Union (ACLU) |
Topical term or geographic name as entry element | Business Software Alliance |
Topical term or geographic name as entry element | Central Intelligence Agency (CIA) |
Topical term or geographic name as entry element | Clinton administration |
Topical term or geographic name as entry element | United States |
Topical term or geographic name as entry element | Cypherpunks |
Topical term or geographic name as entry element | Data Encryption Standard (DES) |
Topical term or geographic name as entry element | Digital Signature Standard (DSS) |
Topical term or geographic name as entry element | Electronic Frontier Foundation (EFF) |
Topical term or geographic name as entry element | Federal Bureau of Investigation (FBI) |
Topical term or geographic name as entry element | IBM |
Topical term or geographic name as entry element | Invention Secrets Act |
Topical term or geographic name as entry element | Key escrow/recovery |
Topical term or geographic name as entry element | National Security Agency (NSA) |
Topical term or geographic name as entry element | Pretty Good Privacy (PGP) |
Topical term or geographic name as entry element | Public Key Cryptography |
Topical term or geographic name as entry element | RSA Data Security Incorporated (RSADSI) |
Topical term or geographic name as entry element | Operation BULLRUN |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent location | Current location | Date acquired | Cost, normal purchase price | Full call number | Barcode | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
DAIICT | DAIICT | 2021-12-31 | 2823.15 | 323.448 JAR | 032742 | 2022-01-04 | Books |