The electronic privacy papers : documents on the battle for privacy in the age of surveillance / [edited by] Bruce Schneier, David Banisar.
Material type: TextPublisher: New York : Wiley, [1997]Copyright date: ©1997Description: xvii, 747 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 0471122971
- 9780471122975
- 323.4480973
- JC596.2.U5 E44 1997
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Book | City Campus City Campus Main Collection | 323.4480973 ELE (Browse shelf(Opens below)) | 1 | Available | A249910B |
Browsing City Campus shelves, Shelving location: City Campus Main Collection Close shelf browser (Hides shelf browser)
323.448 THO Privacy and social services / | 323.448 WAL Privacy as trust : information privacy for an information age / | 323.448 WES Privacy and freedom / | 323.4480973 ELE The electronic privacy papers : documents on the battle for privacy in the age of surveillance / | 323.4480973 GAR Database nation : the death of privacy in the 21st century / | 323.4480973 GAR Database nation : the death of privacy in the 21st century / | 323.4480973 NIS Privacy in context : technology, policy, and the integrity of social life / |
"Wiley Computer Publishing.".
Includes bibliographical references (pages 729-734) and index.
Privacy and the Information Snooperhighway -- Roadblocks on the Information Superhighway -- Wiretapping -- Overview of Wiretapping -- Lobbying for Surveillance: the Digital Telephony Proposal -- Digital Telephony: The Public Response -- Cryptography -- Cryptography: The Cure for the Common Bug -- The Battle for Control of Cryptography -- Early Skirmishes -- The Clipper Chip Proposal -- Clipping the Clipper: Public Response to Desktop Surveillance -- Putting the Genie Back in the Bottle: Export Controls on Cryptography -- Atom Bombs, Fighter Planes, Machines Guns, and Cryptography: Export Controls -- Big Brother As the Keeper of the Keys: Will the Government Take Over Crypto? -- Banning Cryptography -- Software Key Escrow -- Epilogue.
Machine converted from AACR2 source record.
There are no comments on this title.