000350884 000__ 01528cam\a2200301\a\4500 000350884 001__ 350884 000350884 005__ 20210513125804.0 000350884 008__ 100805s2010\\\\maua\\\\\b\\\\001\0\eng\\ 000350884 010__ $$a 2010030887 000350884 020__ $$a9780262015301 (alk. paper) 000350884 020__ $$a0262015307 (alk. paper) 000350884 035__ $$a(OCoLC)ocn654814042 000350884 035__ $$a350884 000350884 040__ $$aDLC$$cDLC$$dYDX$$dYDXCP$$dBWX$$dSINLB$$dTWC$$dCDX 000350884 049__ $$aISEA 000350884 05000 $$aTK5102.85$$b.L36 2010 000350884 08200 $$a363.25/2$$222 000350884 1001_ $$aLandau, Susan Eva. 000350884 24510 $$aSurveillance or security? :$$bthe risks posed by new wiretapping technologies /$$cSusan Landau. 000350884 260__ $$aCambridge, Mass. :$$bMIT Press,$$cc2010. 000350884 300__ $$axvi, 383 p. :$$bill. ;$$c24 cm. 000350884 504__ $$aIncludes bibliographical references and index. 000350884 5050_ $$aIntroduction -- Communication networks and their architectures -- Securing the Internet is difficult -- Wiretaps and the law -- The effectiveness of wiretapping -- Evolving communications technologies -- Who are the intruders? what are they targeting? -- Security risks arising from wiretapping technology -- Policy risks arising from wiretapping -- Communication during crisis -- Getting communications security right. 000350884 650_0 $$aTelecommunication$$xSecurity measures$$zUnited States. 000350884 650_0 $$aWiretapping$$zUnited States. 000350884 650_0 $$aData encryption (Computer science)$$xGovernment policy$$zUnited States. 000350884 650_0 $$aElectronic surveillance$$xPolitical aspects$$zUnited States. 000350884 650_0 $$aComputer crimes$$xRisk assessment$$zUnited States. 000350884 85200 $$bgen$$hTK5102.85$$i.L36$$i2010 000350884 909CO $$ooai:library.usi.edu:350884$$pGLOBAL_SET 000350884 980__ $$aBIB 000350884 980__ $$aBOOK