Author: Craig Bauer
Publisher: CRC Press
ISBN: 1351668498
Category : Computers
Languages : en
Pages : 801
Book Description
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers
Secret History
Author: Craig Bauer
Publisher: CRC Press
ISBN: 1351668498
Category : Computers
Languages : en
Pages : 801
Book Description
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers
Publisher: CRC Press
ISBN: 1351668498
Category : Computers
Languages : en
Pages : 801
Book Description
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers
Intelligence and Surprise Attack
Author: Erik J. Dahl
Publisher: Georgetown University Press
ISBN: 1589019989
Category : Political Science
Languages : en
Pages : 289
Book Description
How can the United States avoid a future surprise attack on the scale of 9/11 or Pearl Harbor, in an era when such devastating attacks can come not only from nation states, but also from terrorist groups or cyber enemies? Intelligence and Surprise Attack examines why surprise attacks often succeed even though, in most cases, warnings had been available beforehand. Erik J. Dahl challenges the conventional wisdom about intelligence failure, which holds that attacks succeed because important warnings get lost amid noise or because intelligence officials lack the imagination and collaboration to “connect the dots” of available information. Comparing cases of intelligence failure with intelligence success, Dahl finds that the key to success is not more imagination or better analysis, but better acquisition of precise, tactical-level intelligence combined with the presence of decision makers who are willing to listen to and act on the warnings they receive from their intelligence staff. The book offers a new understanding of classic cases of conventional and terrorist attacks such as Pearl Harbor, the Battle of Midway, and the bombings of US embassies in Kenya and Tanzania. The book also presents a comprehensive analysis of the intelligence picture before the 9/11 attacks, making use of new information available since the publication of the 9/11 Commission Report and challenging some of that report’s findings.
Publisher: Georgetown University Press
ISBN: 1589019989
Category : Political Science
Languages : en
Pages : 289
Book Description
How can the United States avoid a future surprise attack on the scale of 9/11 or Pearl Harbor, in an era when such devastating attacks can come not only from nation states, but also from terrorist groups or cyber enemies? Intelligence and Surprise Attack examines why surprise attacks often succeed even though, in most cases, warnings had been available beforehand. Erik J. Dahl challenges the conventional wisdom about intelligence failure, which holds that attacks succeed because important warnings get lost amid noise or because intelligence officials lack the imagination and collaboration to “connect the dots” of available information. Comparing cases of intelligence failure with intelligence success, Dahl finds that the key to success is not more imagination or better analysis, but better acquisition of precise, tactical-level intelligence combined with the presence of decision makers who are willing to listen to and act on the warnings they receive from their intelligence staff. The book offers a new understanding of classic cases of conventional and terrorist attacks such as Pearl Harbor, the Battle of Midway, and the bombings of US embassies in Kenya and Tanzania. The book also presents a comprehensive analysis of the intelligence picture before the 9/11 attacks, making use of new information available since the publication of the 9/11 Commission Report and challenging some of that report’s findings.
Naval Warfare 1919-45
Author: Malcolm H. Murfett
Publisher: Routledge
ISBN: 1134048122
Category : History
Languages : en
Pages : 818
Book Description
Naval Warfare 1919–45 is a comprehensive history of the war at sea from the end of the Great War to the end of World War Two. Showing the bewildering nature and complexity of the war facing those charged with fighting it around the world, this book ranges far and wide: sweeping across all naval theatres and those powers performing major, as well as minor, roles within them. Armed with the latest material from an extensive set of sources, Malcolm H. Murfett has written an absorbing as well as a comprehensive reference work. He demonstrates that superior equipment and the best intelligence, ominous power and systematic planning, vast finance and suitable training are often simply not enough in themselves to guarantee the successful outcome of a particular encounter at sea. Sometimes the narrow difference between victory and defeat hinges on those infinite variables: the individual’s performance under acute pressure and sheer luck. Naval Warfare 1919–45 is an analytical and interpretive study which is an accessible and fascinating read both for students and for interested members of the general public.
Publisher: Routledge
ISBN: 1134048122
Category : History
Languages : en
Pages : 818
Book Description
Naval Warfare 1919–45 is a comprehensive history of the war at sea from the end of the Great War to the end of World War Two. Showing the bewildering nature and complexity of the war facing those charged with fighting it around the world, this book ranges far and wide: sweeping across all naval theatres and those powers performing major, as well as minor, roles within them. Armed with the latest material from an extensive set of sources, Malcolm H. Murfett has written an absorbing as well as a comprehensive reference work. He demonstrates that superior equipment and the best intelligence, ominous power and systematic planning, vast finance and suitable training are often simply not enough in themselves to guarantee the successful outcome of a particular encounter at sea. Sometimes the narrow difference between victory and defeat hinges on those infinite variables: the individual’s performance under acute pressure and sheer luck. Naval Warfare 1919–45 is an analytical and interpretive study which is an accessible and fascinating read both for students and for interested members of the general public.
Under the Wire
Author: David Paull NICKLES
Publisher: Harvard University Press
ISBN: 0674041550
Category : History
Languages : en
Pages : 272
Book Description
How did the telegraph, a new and revolutionary form of communication, affect diplomats, who tended to resist change? In a study based on impressive multinational research, David Paull Nickles examines the critical impact of the telegraph on the diplomacy of the nineteenth and early twentieth centuries. Case studies in crisis diplomacy--the War of 1812, the Trent affair during the U.S. Civil War, and the famous 1917 Zimmermann telegram--introduce wide-ranging thematic discussions on the autonomy of diplomats; the effects of increased speed on decision making and public opinion; the neglected role of clerks in diplomacy; and the issues of expense, garbled text, espionage, and technophobia that initially made foreign ministries wary of telegraphy. Ultimately, the introduction of the telegraph contributed to the centralization of foreign ministries and the rising importance of signals intelligence. The faster pace of diplomatic disputes invited more emotional decisions by statesmen, while public opinion often exercised a belligerent influence on crises developing over a shorter time period. Under the Wire offers a fascinating new perspective on the culture of diplomacy and the social history of technology. Table of Contents: Introduction I. Control 1. The Anglo-American Crisis of 1812 2. Diplomatic Autonomy and Telecommunications II. Speed 3. The Trent Affair 4. Speed and Diplomacy 5. Diplomatic Time III. The Medium 6. The Zimmermann Telegram 7. Technical and Economic Factors Conclusion Abbreviations Notes Acknowledgments Index Reviews of this book: David Paull Nickles has plumbed the archives of four countries to determine just how transformative [the invention of the telegraph] really was. Under the Wire is a subtle and impressive examination of history. --Christian D. Brose, Wall Street Journal In this study of the impact of telegraphy on the management of international relations, the reader is rewarded time and again by finding original observations regarding familiar events. This is a book that can have a shaping effect not only on the field of international relations but on many others, since it compels one to think hard about how changes in technology affect behavior and thought among groups with deeply rooted traditions and beliefs. --Ernest R. May, Harvard University
Publisher: Harvard University Press
ISBN: 0674041550
Category : History
Languages : en
Pages : 272
Book Description
How did the telegraph, a new and revolutionary form of communication, affect diplomats, who tended to resist change? In a study based on impressive multinational research, David Paull Nickles examines the critical impact of the telegraph on the diplomacy of the nineteenth and early twentieth centuries. Case studies in crisis diplomacy--the War of 1812, the Trent affair during the U.S. Civil War, and the famous 1917 Zimmermann telegram--introduce wide-ranging thematic discussions on the autonomy of diplomats; the effects of increased speed on decision making and public opinion; the neglected role of clerks in diplomacy; and the issues of expense, garbled text, espionage, and technophobia that initially made foreign ministries wary of telegraphy. Ultimately, the introduction of the telegraph contributed to the centralization of foreign ministries and the rising importance of signals intelligence. The faster pace of diplomatic disputes invited more emotional decisions by statesmen, while public opinion often exercised a belligerent influence on crises developing over a shorter time period. Under the Wire offers a fascinating new perspective on the culture of diplomacy and the social history of technology. Table of Contents: Introduction I. Control 1. The Anglo-American Crisis of 1812 2. Diplomatic Autonomy and Telecommunications II. Speed 3. The Trent Affair 4. Speed and Diplomacy 5. Diplomatic Time III. The Medium 6. The Zimmermann Telegram 7. Technical and Economic Factors Conclusion Abbreviations Notes Acknowledgments Index Reviews of this book: David Paull Nickles has plumbed the archives of four countries to determine just how transformative [the invention of the telegraph] really was. Under the Wire is a subtle and impressive examination of history. --Christian D. Brose, Wall Street Journal In this study of the impact of telegraphy on the management of international relations, the reader is rewarded time and again by finding original observations regarding familiar events. This is a book that can have a shaping effect not only on the field of international relations but on many others, since it compels one to think hard about how changes in technology affect behavior and thought among groups with deeply rooted traditions and beliefs. --Ernest R. May, Harvard University
The Entity
Author: Eric Frattini
Publisher: Macmillan + ORM
ISBN: 1429947241
Category : History
Languages : en
Pages : 472
Book Description
The International Bestseller "A true story that surpasses any novel by John le Carré."—El País (Spain) For five centuries, the Vatican—the oldest organization in the world, maker of kings and shaper of history—has used a secret spy service, called the Holy Alliance, or later, the Entity, to carry out its will. Forty popes have relied on it to carry out their policies. They have played a hitherto invisible role confronting de-Christianizations and schisms, revolutions and dictators, colonizations and expulsions, persecutions and attacks, civil wars and world wars, assassinations and kidnappings. For the first time in English (following the bestselling Spanish and French editions), Eric Frattini tells the comprehensive tale of this sacred secret service. The Entity has been involved in the killings of monarchs, poisonings of diplomats, financing of South American dictators, protection of war criminals, laundering of Mafia money, manipulation of financial markets, provocation of bank failures, and financing of arms sales to combatants even as their wars were condemned, all in the name of God. The contradiction between God's justice and Earth's justice, Christian beliefs and Christian power all fall before the motto of the Entity: With the Cross and the Sword.
Publisher: Macmillan + ORM
ISBN: 1429947241
Category : History
Languages : en
Pages : 472
Book Description
The International Bestseller "A true story that surpasses any novel by John le Carré."—El País (Spain) For five centuries, the Vatican—the oldest organization in the world, maker of kings and shaper of history—has used a secret spy service, called the Holy Alliance, or later, the Entity, to carry out its will. Forty popes have relied on it to carry out their policies. They have played a hitherto invisible role confronting de-Christianizations and schisms, revolutions and dictators, colonizations and expulsions, persecutions and attacks, civil wars and world wars, assassinations and kidnappings. For the first time in English (following the bestselling Spanish and French editions), Eric Frattini tells the comprehensive tale of this sacred secret service. The Entity has been involved in the killings of monarchs, poisonings of diplomats, financing of South American dictators, protection of war criminals, laundering of Mafia money, manipulation of financial markets, provocation of bank failures, and financing of arms sales to combatants even as their wars were condemned, all in the name of God. The contradiction between God's justice and Earth's justice, Christian beliefs and Christian power all fall before the motto of the Entity: With the Cross and the Sword.
Good-Bye, Lord, I’M Going to New York
Author: Vic Currierv
Publisher: Xlibris Corporation
ISBN: 1503547728
Category : Biography & Autobiography
Languages : en
Pages : 304
Book Description
America would be very different if William Harding Jackson (1901 1971) had not put his indelible stamp on the US government as OSS / War Department chief of secret intelligence in World War II Europe, cofounder of todays Central Intelligence Agency, and his work as Eisenhowers national security adviser. During the most dangerous times in our history and for decades beyond his death, there is no other American who influenced so many sensitive, top-secret national security matters more than Jackson. When Bill Jackson was in the room, everyone paid attention; and for a time in our history, three US presidents saw to itpersonally.
Publisher: Xlibris Corporation
ISBN: 1503547728
Category : Biography & Autobiography
Languages : en
Pages : 304
Book Description
America would be very different if William Harding Jackson (1901 1971) had not put his indelible stamp on the US government as OSS / War Department chief of secret intelligence in World War II Europe, cofounder of todays Central Intelligence Agency, and his work as Eisenhowers national security adviser. During the most dangerous times in our history and for decades beyond his death, there is no other American who influenced so many sensitive, top-secret national security matters more than Jackson. When Bill Jackson was in the room, everyone paid attention; and for a time in our history, three US presidents saw to itpersonally.
Midway: Dauntless Victory
Author: Peter C. Smith
Publisher: Casemate Publishers
ISBN: 184884705X
Category : History
Languages : en
Pages : 857
Book Description
This is an in-depth study of the battle of Midway that reviews the many previous accounts and compares their accuracy and veracity with fresh documentation that has been released recently, including new material on the post-war analysis made by a US select committee. There are new viewpoints on the muddle among the US Admirals; the total failure of the USAAF, despite elaborate claims; fresh thinking on the part played by the US Navy Dauntless dive-bombers in the action; the mystery of the carrier Saratoga's presence; Hollywood's totally wrong take on the battle in all the films since made about it. Also, included are new eyewitness accounts the author has obtained and information from Japanese sources that has never been previously published. The lengthy Appendices will include statistical details of the ships, the planes and the men.
Publisher: Casemate Publishers
ISBN: 184884705X
Category : History
Languages : en
Pages : 857
Book Description
This is an in-depth study of the battle of Midway that reviews the many previous accounts and compares their accuracy and veracity with fresh documentation that has been released recently, including new material on the post-war analysis made by a US select committee. There are new viewpoints on the muddle among the US Admirals; the total failure of the USAAF, despite elaborate claims; fresh thinking on the part played by the US Navy Dauntless dive-bombers in the action; the mystery of the carrier Saratoga's presence; Hollywood's totally wrong take on the battle in all the films since made about it. Also, included are new eyewitness accounts the author has obtained and information from Japanese sources that has never been previously published. The lengthy Appendices will include statistical details of the ships, the planes and the men.
Demystifying Shariah
Author: Sumbul Ali-Karamali
Publisher: Beacon Press
ISBN: 0807038008
Category : Social Science
Languages : en
Pages : 258
Book Description
A direct counterpoint to fear mongering headlines about shariah law—a Muslim American legal expert tells the real story, eliminating stereotypes and assumptions with compassion, irony, and humor Through scare tactics and deliberate misinformation campaigns, anti-Muslim propagandists insist wrongly that shariah is a draconian and oppressive Islamic law that all Muslims must abide by. They circulate horror stories, encouraging Americans to fear the “takeover of shariah” law in America and even mounting “anti-shariah protests” . . . . with zero evidence that shariah has taken over any part of our country. (That’s because it hasn’t.) It would be almost funny if it weren’t so terrifyingly wrong—as puzzling as if Americans suddenly began protesting the Martian occupation of Earth. Demystifying Shariah explains that shariah is not one set of punitive rules or even law the way we think of law—rigid and enforceable—but religious rules and recommendations that provide Muslims with guidance in various aspects of life. Sumbul Ali-Karamali draws on scholarship and her degree in Islamic law to explain shariah in an accessible, engaging narrative style—its various meanings, how it developed, and how the shariah-based legal system operated for over a thousand years. She explains what shariah means not only in the abstract but in the daily lives of Muslims. She discusses modern calls for shariah, what they mean, and whether shariah is the law of the land anywhere in the world. She also describes the key lies and misunderstandings about shariah circulating in our public discourse, and why so many of them are nonsensical. This engaging guide is intended to introduce you to the basic principles, goals, and general development of shariah and to answer questions like: How do Muslims engage with shariah? What does shariah have to do with our Constitution? What does shariah have to do with the way the world looks like today? And why do we all—Muslims or not—need to care?
Publisher: Beacon Press
ISBN: 0807038008
Category : Social Science
Languages : en
Pages : 258
Book Description
A direct counterpoint to fear mongering headlines about shariah law—a Muslim American legal expert tells the real story, eliminating stereotypes and assumptions with compassion, irony, and humor Through scare tactics and deliberate misinformation campaigns, anti-Muslim propagandists insist wrongly that shariah is a draconian and oppressive Islamic law that all Muslims must abide by. They circulate horror stories, encouraging Americans to fear the “takeover of shariah” law in America and even mounting “anti-shariah protests” . . . . with zero evidence that shariah has taken over any part of our country. (That’s because it hasn’t.) It would be almost funny if it weren’t so terrifyingly wrong—as puzzling as if Americans suddenly began protesting the Martian occupation of Earth. Demystifying Shariah explains that shariah is not one set of punitive rules or even law the way we think of law—rigid and enforceable—but religious rules and recommendations that provide Muslims with guidance in various aspects of life. Sumbul Ali-Karamali draws on scholarship and her degree in Islamic law to explain shariah in an accessible, engaging narrative style—its various meanings, how it developed, and how the shariah-based legal system operated for over a thousand years. She explains what shariah means not only in the abstract but in the daily lives of Muslims. She discusses modern calls for shariah, what they mean, and whether shariah is the law of the land anywhere in the world. She also describes the key lies and misunderstandings about shariah circulating in our public discourse, and why so many of them are nonsensical. This engaging guide is intended to introduce you to the basic principles, goals, and general development of shariah and to answer questions like: How do Muslims engage with shariah? What does shariah have to do with our Constitution? What does shariah have to do with the way the world looks like today? And why do we all—Muslims or not—need to care?
Digital Communication
Author: Christoph Meinel
Publisher: Springer Science & Business Media
ISBN: 3642543316
Category : Computers
Languages : en
Pages : 406
Book Description
The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities including a glossary for each chapter increase the practical benefit of this book that is well suited as well as for undergraduate students as for working practitioners.
Publisher: Springer Science & Business Media
ISBN: 3642543316
Category : Computers
Languages : en
Pages : 406
Book Description
The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities including a glossary for each chapter increase the practical benefit of this book that is well suited as well as for undergraduate students as for working practitioners.
Security Engineering
Author: Ross Anderson
Publisher: John Wiley & Sons
ISBN: 1119642817
Category : Computers
Languages : en
Pages : 1232
Book Description
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are – from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do – from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability – why companies build vulnerable systems and governments look the other way How dozens of industries went online – well or badly How to manage security and safety engineering in a world of agile development – from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?
Publisher: John Wiley & Sons
ISBN: 1119642817
Category : Computers
Languages : en
Pages : 1232
Book Description
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are – from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do – from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability – why companies build vulnerable systems and governments look the other way How dozens of industries went online – well or badly How to manage security and safety engineering in a world of agile development – from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?