Securing the Past

Securing the Past
Author: Paul Eggert
Publisher: Cambridge University Press
Total Pages: 0
Release: 2009-01-15
Genre: Art
ISBN: 0521898080

An investigation of the linked underlying theories behind the different arts and practices of restoring historic objects and texts.

Body of Secrets

Body of Secrets
Author: James Bamford
Publisher: Anchor
Total Pages: 782
Release: 2007-12-18
Genre: Political Science
ISBN: 0307425053

The National Security Agency is the world’s most powerful, most far-reaching espionage. Now with a new afterword describing the security lapses that preceded the attacks of September 11, 2001, Body of Secrets takes us to the inner sanctum of America’s spy world. In the follow-up to his bestselling Puzzle Palace, James Banford reveals the NSA’s hidden role in the most volatile world events of the past, and its desperate scramble to meet the frightening challenges of today and tomorrow. Here is a scrupulously documented account—much of which is based on unprecedented access to previously undisclosed documents—of the agency’s tireless hunt for intelligence on enemies and allies alike. Body of secrets is a riveting analysis of this most clandestine of agencies, a major work of history and investigative journalism. A New York Times Notable Book

A Vulnerable System

A Vulnerable System
Author: Andrew J. Stewart
Publisher: Cornell University Press
Total Pages: 310
Release: 2021-09-15
Genre: Computers
ISBN: 1501759043

As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk. Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed. A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality. The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.

Attached

Attached
Author: Amir Levine
Publisher: Penguin
Total Pages: 305
Release: 2010-12-30
Genre: Family & Relationships
ISBN: 1101475161

“Over a decade after its publication, one book on dating has people firmly in its grip.” —The New York Times We already rely on science to tell us what to eat, when to exercise, and how long to sleep. Why not use science to help us improve our relationships? In this revolutionary book, psychiatrist and neuroscientist Dr. Amir Levine and Rachel Heller scientifically explain why some people seem to navigate relationships effortlessly, while others struggle. Discover how an understanding of adult attachment—the most advanced relationship science in existence today—can help us find and sustain love. Pioneered by psychologist John Bowlby in the 1950s, the field of attachment posits that each of us behaves in relationships in one of three distinct ways: • Anxious people are often preoccupied with their relationships and tend to worry about their partner's ability to love them back. • Avoidant people equate intimacy with a loss of independence and constantly try to minimize closeness. • Secure people feel comfortable with intimacy and are usually warm and loving. Attached guides readers in determining what attachment style they and their mate (or potential mate) follow, offering a road map for building stronger, more fulfilling connections with the people they love.

Security Metrics

Security Metrics
Author: Andrew Jaquith
Publisher: Pearson Education
Total Pages: 356
Release: 2007-03-26
Genre: Computers
ISBN: 0132715775

The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to: • Replace nonstop crisis response with a systematic approach to security improvement • Understand the differences between “good” and “bad” metrics • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk • Quantify the effectiveness of security acquisition, implementation, and other program activities • Organize, aggregate, and analyze your data to bring out key insights • Use visualization to understand and communicate security issues more clearly • Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources • Implement balanced scorecards that present compact, holistic views of organizational security effectiveness

Our Unfinished March

Our Unfinished March
Author: Eric Holder
Publisher: One World
Total Pages: 305
Release: 2023-06-06
Genre: Political Science
ISBN: 0593445767

A brutal, bloody, and at times hopeful history of the vote; a primer on the opponents fighting to take it away; and a playbook for how we can save our democracy before it’s too late—from the former U.S. Attorney General on the front lines of this fight Voting is our most important right as Americans—“the right that protects all the others,” as Lyndon Johnson famously said when he signed the Voting Rights Act—but it’s also the one most violently contested throughout U.S. history. Since the gutting of the act in the landmark Shelby County v. Holder case in 2013, many states have passed laws restricting the vote. After the 2020 election, President Trump’s effort to overturn the vote has evolved into a slow-motion coup, with many Republicans launching an all-out assault on our democracy. The vote seems to be in unprecedented peril. But the peril is not at all unprecedented. America is a fragile democracy, Eric Holder argues, whose citizens have only had unfettered access to the ballot since the 1960s. He takes readers through three dramatic stories of how the vote was won: first by white men, through violence and insurrection; then by white women, through protests and mass imprisonments; and finally by African Americans, in the face of lynchings and terrorism. Next, he dives into how the vote has been stripped away since Shelby—a case in which Holder was one of the parties. He ends with visionary chapters on how we can reverse this tide of voter suppression and become a true democracy where every voice is heard and every vote is counted. Full of surprising history, intensive analysis, and actionable plans for the future, this is a powerful primer on our most urgent political struggle from one of the country's leading advocates.

The Perfect Weapon

The Perfect Weapon
Author: David E. Sanger
Publisher: Crown
Total Pages: 402
Release: 2018-06-19
Genre: Political Science
ISBN: 0451497910

NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents—Bush and Obama—drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend the 2016 U.S. election from interference by Russia, with Vladimir Putin drawing on the same playbook he used to destabilize Ukraine. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target. “Timely and bracing . . . With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the twenty-first century.”—Washington Post

Thieves of State: Why Corruption Threatens Global Security

Thieves of State: Why Corruption Threatens Global Security
Author: Sarah Chayes
Publisher: W. W. Norton & Company
Total Pages: 249
Release: 2015-01-19
Genre: Political Science
ISBN: 0393246531

Winner of the 2015 Los Angeles Times Book Prize for Current Interest. "I can’t imagine a more important book for our time." —Sebastian Junger The world is blowing up. Every day a new blaze seems to ignite: the bloody implosion of Iraq and Syria; the East-West standoff in Ukraine; abducted schoolgirls in Nigeria. Is there some thread tying these frightening international security crises together? In a riveting account that weaves history with fast-moving reportage and insider accounts from the Afghanistan war, Sarah Chayes identifies the unexpected link: corruption. Since the late 1990s, corruption has reached such an extent that some governments resemble glorified criminal gangs, bent solely on their own enrichment. These kleptocrats drive indignant populations to extremes—ranging from revolution to militant puritanical religion. Chayes plunges readers into some of the most venal environments on earth and examines what emerges: Afghans returning to the Taliban, Egyptians overthrowing the Mubarak government (but also redesigning Al-Qaeda), and Nigerians embracing both radical evangelical Christianity and the Islamist terror group Boko Haram. In many such places, rigid moral codes are put forth as an antidote to the collapse of public integrity. The pattern, moreover, pervades history. Through deep archival research, Chayes reveals that canonical political thinkers such as John Locke and Machiavelli, as well as the great medieval Islamic statesman Nizam al-Mulk, all named corruption as a threat to the realm. In a thrilling argument connecting the Protestant Reformation to the Arab Spring, Thieves of State presents a powerful new way to understand global extremism. And it makes a compelling case that we must confront corruption, for it is a cause—not a result—of global instability.

White House Warriors: How the National Security Council Transformed the American Way of War

White House Warriors: How the National Security Council Transformed the American Way of War
Author: John Gans
Publisher: Liveright Publishing
Total Pages: 367
Release: 2019-05-14
Genre: Political Science
ISBN: 1631494570

“The NSC, part star chamber, part gladiator arena, and part Game of Thrones drama is expertly revealed to us in the pages of Gans’ primer on Washington power.” — Kurt Campbell, Chairman of the Asia Group, LLC Since its founding more than seventy years ago, the National Security Council has exerted more influence on the president’s foreign policy decisions—and on the nation’s conflicts abroad—than any other institution or individual. And yet, until the explosive Trump presidency, few Americans could even name a member. “A must-read for anyone interested in how Washington really works” (Ivo H. Daalder), White House Warriors finally reveals how the NSC evolved from a handful of administrative clerks to, as one recent commander-in-chief called them, the president’s “personal band of warriors.” When Congress originally created the National Security Council in 1947, it was intended to better coordinate foreign policy after World War II. Nearly an afterthought, a small administrative staff was established to help keep its papers moving. President Kennedy was, as John Gans documents, the first to make what became known as the NSC staff his own, selectively hiring bright young aides to do his bidding during the disastrous Bay of Pigs operation, the fraught Cuban Missile Crisis, and the deepening Vietnam War. Despite Kennedy’s death and the tragic outcome of some of his decision, the NSC staff endured. President Richard Nixon handed the staff’s reigns solely to Henry Kissinger, who, given his controlling instincts, micromanaged its work on Vietnam. In the 1980s, President Ronald Reagan’s NSC was cast into turmoil by overreaching staff members who, led by Oliver North, nearly brought down a presidency in the Iran-Contra scandal. Later, when President George W. Bush’s administration was bitterly divided by the Iraq War, his NSC staff stepped forward to write a plan for the Surge in Iraq. Juxtaposing extensive archival research with new interviews, Gans demonstrates that knowing the NSC staff’s history and its war stories is the only way to truly understand American foreign policy. As this essential account builds to the swift removals of advisors General Michael Flynn and Steve Bannon in 2017, we see the staff’s influence in President Donald Trump’s still chaotic administration and come to understand the role it might play in its aftermath. A revelatory history written with riveting DC insider detail, White House Warriors traces the path that has led us to an era of American aggression abroad, debilitating fights within the government, and whispers about a deep state conspiring against the public.