The Encrypted State
Title | The Encrypted State PDF eBook |
Author | David Nugent |
Publisher | Stanford University Press |
Pages | 386 |
Release | 2019-08-13 |
Genre | Social Science |
ISBN | 1503609723 |
What happens when a seemingly rational state becomes paranoid and delusional? The Encrypted State engages in a close analysis of political disorder to shed new light on the concept of political stability. The book focuses on a crisis of rule in mid-20th-century Peru, a period when officials believed they had lost the ability to govern and communicated in secret code to protect themselves from imaginary subversives. The Encrypted State engages the notion of sacropolitics—the politics of mass group sacrifice—to make sense of state delusion. Nugent interrogates the forces that variously enable or disable organized political subjection, and the role of state structures in this process. Investigating the role of everyday cultural practices and how affect and imagination structure political affairs, Nugent provides a greater understanding of the conditions of state formation, and failure.
Terraform in Action
Title | Terraform in Action PDF eBook |
Author | Scott Winkler |
Publisher | Simon and Schuster |
Pages | 604 |
Release | 2021-08-24 |
Genre | Computers |
ISBN | 1638350310 |
"An outstanding source of knowledge for Terraform enthusiasts of all levels." - Anton Babenko, Betajob Terraform in Action shows you how to automate and scale infrastructure programmatically using the Terraform toolkit. Summary In Terraform in Action you will learn: Cloud architecture with Terraform Terraform module sharing and the private module registry Terraform security in a multitenant environment Strategies for performing blue/green deployments Refactoring for code maintenance and reusability Running Terraform at scale Creating your own Terraform provider Using Terraform as a continuous development/continuous delivery platform Terraform in Action introduces the infrastructure-as-code (IaC) model that lets you instantaneously create new components and respond efficiently to changes in demand. You’ll use the Terraform automation tool to design and manage servers that can be provisioned, shared, changed, tested, and deployed with a single command. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Provision, deploy, scale, and clone your entire stack to the cloud at the touch of a button. In Terraform, you create a collection of simple declarative scripts that define and manage application infrastructure. This powerful infrastructure-as-code approach automates key tasks like versioning and testing for everything from low-level networking to cloud services. About the book Terraform in Action shows you how to automate and scale infrastructure programmatically using the Terraform toolkit. Using practical, relevant examples, you’ll use Terraform to provision a Kubernetes cluster, deploy a multiplayer game, and configure other hands-on projects. As you progress to advanced techniques like zero-downtime deployments, you’ll discover how to think in Terraform rather than just copying and pasting scripts. What's inside Cloud architecture with Terraform Terraform module sharing and the private module registry Terraform security in a multitenant environment Strategies for performing blue/green deployments About the reader For readers experienced with a major cloud platform such as AWS. Examples in JavaScript and Golang. About the author Scott Winkler is a DevOps engineer and a distinguished Terraform expert. He has spoken multiple times at HashiTalks and HashiConf, and was selected as a HashiCorp Ambassador and Core Contributor in 2020. Table of Contents PART 1 TERRAFORM BOOTCAMP 1 Getting started with Terraform 2 Life cycle of a Terraform resource 3 Functional programming 4 Deploying a multi-tiered web application in AWS PART 2 TERRAFORM IN THE WILD 5 Serverless made easy 6 Terraform with friends 7 CI/CD pipelines as code 8 A multi-cloud MMORPG PART 3 MASTERING TERRAFORM 9 Zero-downtime deployments 10 Testing and refactoring 11 Extending Terraform by writing a custom provider 12 Automating Terraform 13 Security and secrets management
State Failure in the Modern World
Title | State Failure in the Modern World PDF eBook |
Author | Zaryab Iqbal |
Publisher | Stanford University Press |
Pages | 169 |
Release | 2015-12-16 |
Genre | Political Science |
ISBN | 0804796912 |
State failure is seen as one of the significant threats to regional and international stability in the current international system. State Failure in the Modern World presents a comprehensive, systematic, and empirically rigorous analysis of the full range of the state failure process in the post-World War II state system—including what state failure means, its causes, what accounts for its duration, its consequences, and its implications. Among the questions the book addresses are: when and why state failure occurs, why it recurs in any single state, and when and why its consequences spread to other states. The book sets out the array of problems in previous work on state failure with respect to conceptualization and definition, as well as how the causes and consequences of state failure have been addressed, and presents analyses to deal with these problems. Any analysis of state failure can be seen as an exercise in policy evaluation; this book undertakes the theoretical, conceptual, and analytic work that must be done before we can evaluate—or have much confidence in—both current and proposed policy prescriptions to prevent or manage state collapse.
Real-World Cryptography
Title | Real-World Cryptography PDF eBook |
Author | David Wong |
Publisher | Simon and Schuster |
Pages | 398 |
Release | 2021-10-19 |
Genre | Computers |
ISBN | 1638350841 |
"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations. About the book Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data. What's inside Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem About the reader For cryptography beginners with no previous experience in the field. About the author David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security. Table of Contents PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY 1 Introduction 2 Hash functions 3 Message authentication codes 4 Authenticated encryption 5 Key exchanges 6 Asymmetric encryption and hybrid encryption 7 Signatures and zero-knowledge proofs 8 Randomness and secrets PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY 9 Secure transport 10 End-to-end encryption 11 User authentication 12 Crypto as in cryptocurrency? 13 Hardware cryptography 14 Post-quantum cryptography 15 Is this it? Next-generation cryptography 16 When and where cryptography fails
Dark Mirror
Title | Dark Mirror PDF eBook |
Author | Barton Gellman |
Publisher | Penguin |
Pages | 450 |
Release | 2020-05-19 |
Genre | Political Science |
ISBN | 0698153391 |
From the three-time Pulitzer Prize-winning author of the New York Times bestseller Angler, who unearthed the deepest secrets of Edward Snowden's NSA archive, the first master narrative of the surveillance state that emerged after 9/11 and why it matters, based on scores of hours of conversation with Snowden and groundbreaking reportage in Washington, London, Moscow and Silicon Valley Edward Snowden chose three journalists to tell the stories in his Top Secret trove of NSA documents: Barton Gellman of The Washington Post, Glenn Greenwald of The Guardian and filmmaker Laura Poitras, all of whom would share the Pulitzer Prize for Public Service. Poitras went on to direct the Oscar-winning Citizen Four. Greenwald wrote an instant memoir and cast himself as a pugilist on Snowden's behalf. Barton Gellman took his own path. Snowden and his documents were the beginning, not the end, of a story he had prepared his whole life to tell. More than 20 years as a top investigative journalist armed him with deep sources in national security and high technology. New sources reached out from government and industry, making contact on the same kinds of secret, anonymous channels that Snowden used. Gellman's old reporting notes unlocked new puzzles in the NSA archive. Long days and evenings with Snowden in Moscow revealed a complex character who fit none of the stock images imposed on him by others. Gellman now brings his unique access and storytelling gifts to a true-life spy tale that touches us all. Snowden captured the public imagination but left millions of people unsure what to think. Who is the man, really? How did he beat the world's most advanced surveillance agency at its own game? Is government and corporate spying as bad as he says? Dark Mirror is the master narrative we have waited for, told with authority and an inside view of extraordinary events. Within it is a personal account of the obstacles facing the author, beginning with Gellman's discovery of his own name in the NSA document trove. Google notifies him that a foreign government is trying to compromise his account. A trusted technical adviser finds anomalies on his laptop. Sophisticated impostors approach Gellman with counterfeit documents, attempting to divert or discredit his work. Throughout Dark Mirror, the author describes an escalating battle against unknown digital adversaries, forcing him to mimic their tradecraft in self-defense. Written in the vivid scenes and insights that marked Gellman's bestselling Angler, Dark Mirror is an inside account of the surveillance-industrial revolution and its discontents, fighting back against state and corporate intrusions into our most private spheres. Along the way it tells the story of a government leak unrivaled in drama since All the President's Men.
Privacy in Dynamical Systems
Title | Privacy in Dynamical Systems PDF eBook |
Author | Farhad Farokhi |
Publisher | Springer Nature |
Pages | 290 |
Release | 2019-11-21 |
Genre | Technology & Engineering |
ISBN | 9811504938 |
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.
Information Security
Title | Information Security PDF eBook |
Author | Kan Zhang |
Publisher | Springer Science & Business Media |
Pages | 453 |
Release | 2004-09-17 |
Genre | Business & Economics |
ISBN | 3540232087 |
This book constitutes the refereed proceedings of the 7th International Information Security Conference, ISC 2004, held in Palo Alto, CA, USA, in September 2004. The 36 revised full papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on key management, digital signatures, new algorithms, cryptanalysis, intrusion detection, access control, human authentication, certificate management, mobile and ad-hoc security, Web security, digital rights management, and software security.