Logo

Privacy on the Line: The Politics of Wiretapping and Encryption

Large book cover: Privacy on the Line: The Politics of Wiretapping and Encryption

Privacy on the Line: The Politics of Wiretapping and Encryption
by

Publisher: The MIT Press
ISBN-13: 9780262514002
Number of pages: 496

Description:
A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues.

Home page url

Download or read it online for free here:
Download link
(3.9MB, PDF)

Similar books

Book cover: Global Survey on Internet Privacy and Freedom of ExpressionGlobal Survey on Internet Privacy and Freedom of Expression
by - UNESCO
This book identifies the relationship between freedom of expression and Internet privacy, assessing where they support each other in different circumstances. The book maps out the issues in the current regulatory landscape of Internet privacy ...
(7010 views)
Book cover: Lessons from the Identity TrailLessons from the Identity Trail
by - Oxford University Press
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(13458 views)
Book cover: Protecting Children Online?: Cyberbullying Policies of Social Media CompaniesProtecting Children Online?: Cyberbullying Policies of Social Media Companies
by - The MIT Press
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.
(4141 views)
Book cover: Approaching ZeroApproaching Zero
by - ManyBooks
This study offers a somewhat European angle on the 'technological counterculture'. The authors draw on technical literature to examine the techniques of American and British phreakers, and describe the biggest international gathering of hackers.
(8377 views)