Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and user-friendly overview of the regulatory regime that currently governs freedom of information a…
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Securit…
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industr…
Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and user-friendly overview of the regulatory regime that currently governs freedom of information a…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study is to establish an acceptable and sustainable equilibrium between two central moral values in contemporary liberal…
Increasing quantities of information about our health, bodies, and biological relationships are being generated by health technologies, research, and surveillance. This escalation presents challenges to us all when it comes to deciding how to manage this information and what should be disclosed to the very people it describes. This book establishes the ethical imperative to take seriously the p…
This open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world …