|About the Book|
Your (private & organizational) Data (and identity) Protection Manual. Whether you internalize it or not, you are a target in the global cyberwar waged by very smart and cunning people eager to exploit your new vulnerability that is the price ofMoreYour (private & organizational) Data (and identity) Protection Manual. Whether you internalize it or not, you are a target in the global cyberwar waged by very smart and cunning people eager to exploit your new vulnerability that is the price of your newfound digital comfort. To fight back you need to understand the technology for data protection, the procedures to implement that technology, and the all-important human element that is a co-equal factor with the first two. The Unending Cyberwar is a comprehensive manual to help you negotiate this ongoing battlefield. It keeps a balance between technology, procedures, and the human factor, but that is not its only distinction. This book is breaking new grounds in interactivity: it features a global top-down security action template to remind you of what needs to be done in every security situation. The template in the book is also posted on the Web (WeSecure.net) subject to review and modification by readers like you. This Internet-mirror feature of the book facilitates the evolution and refinement of the action guide, keeping the material live and relevant. The book offers a compendium of the security columns published monthly in Digital Transactions Magazine- it tells some fascinating cyberwar stories, and it contains a concise introduction to the technological framework for data protection. Encryption is explained in great conceptual depth, fitting for non geeks, programmers, and security administrators. The Unending Cyberwar illuminates some emerging technologies that would tip the scale towards the good guys: encryption-on-demand, tapping the wisdom of the community, and fraud-resistant paper documents. This is the only book that provides you with a full-proof cover for your digital nakedness (your violated privacy): Deniability levels the playing field! The author is an old hand in security matters, a former Israeli Intelligence officer, now the chief technology officer for AGS Encryptions Ltd, and a professor of engineering at Case Western Reserve University.