Buy new:
$23.15$23.15
Arrives:
Friday, May 12
Ships from: Amazon.com Sold by: Amazon.com
Buy used: $6.78
Other Sellers on Amazon
+ $10.78 shipping
91% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Listening In: Cybersecurity in an Insecure Age
| Price | New from | Used from |
|
Audible Audiobook, Unabridged
"Please retry" |
$0.00
| Free with your Audible trial | |
|
MP3 CD, Audiobook, MP3 Audio, Unabridged
"Please retry" | $10.53 | $7.99 |
Purchase options and add-ons
New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election.
And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
- ISBN-100300227442
- ISBN-13978-0300227444
- PublisherYale University Press
- Publication dateNovember 28, 2017
- LanguageEnglish
- Dimensions8.4 x 5.8 x 0.9 inches
- Print length240 pages
Customers who bought this item also bought
People Count: Contact-Tracing Apps and Public HealthHardcover$17.42 shippingGet it as soon as Monday, May 15Only 1 left in stock - order soon.
Editorial Reviews
Review
“[Landau’s] clean knowledgeable writing reflects the depth of her expertise as she traces the tug of war that has played out between law enforcement and cryptographers in recent decades.”
—Kadhim Shubber, Financial Times
“A detailed overview of the history of cybersecurity.”—Hope Reese, UnDark
“An excellent primer on the importance of encryption for users of technology.”—Choice
"Susan Landau manages to harness the sprint of our online era and provides a lasting framework for how to manage, protect, and even master our digital footprint."—Juliette Kayyem, former Assistant Secretary, United States Department of Homeland Security
"Encryption is essential to our online security, but it also makes the job of law enforcement harder. In Listening In, Landau gives us an authoritative and unflinching look at this challenge and confronts the urgent question of security in the digital age."—Matt Olsen, Former Director, National Counterterrorism Center
"Susan Landau has performed a remarkable feat of public service with Listening In: she simplifies the complex contemporary debate around privacy and security trade-offs in a way that welcomes anyone with an interest in these topics to engage with them -- and she demonstrates why everyone should."—Jonathan Zittrain, author of The Future of the Internet – and How to Stop It
“An extremely important book. Landau has the remarkable talent of taking very broad issues and detailing them in a concise, yet comprehensive manner.”—Ben Rothke, author of Computer Security, on Landau's previous book Surveillance or Security?
"Susan Landau is eminently qualified to guide readers to deeper understanding of risks and threats that accompany an increasingly connected world. Our online appetites are growing and our presence attracts hacking and surveillance among other uses we may not have authorized or even anticipated. Must read."—Vint Cerf, internet pioneer
About the Author
Product details
- Publisher : Yale University Press (November 28, 2017)
- Language : English
- Hardcover : 240 pages
- ISBN-10 : 0300227442
- ISBN-13 : 978-0300227444
- Item Weight : 14.4 ounces
- Dimensions : 8.4 x 5.8 x 0.9 inches
- Best Sellers Rank: #2,128,522 in Books (See Top 100 in Books)
- #1,247 in Privacy & Online Safety
- #1,450 in Computer Hacking
- #3,013 in National & International Security (Books)
- Customer Reviews:
About the author

Susan Landau is Bridge Professor of Cyber Security and Policy at The Fletcher School and the School of Engineering, Department of Computer Science, Tufts University. Landau works at the intersection of cybersecurity, national security, law, and policy. Her book, "People Count: Contact-Tracing Apps and Public Health, " will be published in 2021 by MIT Press; Landau is also the author of "Listening In: Cybersecurity in an Insecure Age" (Yale University Press, 2017), "Surveillance or Security? The Risks Posed by New Wiretapping Technologies," (MIT Press, 2011) and "Privacy on the Line: the Politics of Wiretapping and Encryption," co-authored with Whitfield Diffie (MIT Press, 1998). Landau has testified before Congress on encryption, surveillance, and cybersecurity issues. Landau served as a Senior Staff Privacy Analyst at Google, a Distinguished Engineer at Sun Microsystems, and a faculty member at Worcester Polytechnic Institute, the University of Massachusetts, and Wesleyan University. An inductee in both the Cybersecurity Hall of Fame and the Information System Security Association Hall of Fame and Guggenheim fellow, Landau is also a fellow of the American Association for the Advancement of Science and of the Association for Computing Machinery.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
all seemed rather vague. I know it's not a textbook on cybersecurity but I would have preferred more detail in the explanations of how these things work. I was hoping for a gentle introduction to cryptography and cybersecurity that would have explained things in more detail than https being a secure browser protocol for credit card transactions and such. It kind of feels like the main point of the book is that allowing government back-doors into security systems is the wrong way to go.
An interesting foray into encryption and privacy, especially when considering the point of view of authorities who may need to access data on devices seized upon arrests.
The author makes a case for strengthened encryption, and I feel this makes more sense than the contrary. The book is positioned around the main controversy of including backdoors to allow police and intelligence services to access a device, so that when they need to do it during an investigation, to apprehend a perp or to follow the trail of other people potentially involved, they could do so easily; whereas strong encryption would make it difficult or impossible. However, as has been discussed during actual investigations (an example given in the book involves Apple), there’d be no guarantees that in-built backdoors would be used only by authorities: if they’re here, sooner or later someone with ill intentions is bound to find them and use them, too.
This ties into a general concern about how we have evolved into a digital age, and have to envision security from this perspective. Here also, while not going into deep technical details, the book explains the principles underlying this new brand of security; how this or that method works; the pros and cons of going towards more encryption or less encryption; what other solutions have already been tested, especially in military environments; how cyber-attacks can disrupt governmental operations in many different ways, such as what happened with Estonia and Georgia, and even the 2016 US elections. All very current and hot issues that deserve to be pointed at and examined, because whatever solutions get implemented, if they create less security and impinge on civilian privacy as well, they’re not going to be useful for very long (if ever).
Also interesting, even though it’s not the main focus, is the concept of encryption methods needing to be made public in order to be really efficient: the more people have a chance of poking at them, testing them, and finding faults, the more these methods can be revised and strengthened.
Conclusion: Not a very technical book, but that’s precisely why it makes a good introduction to such matters: easy to understand, while highlighting major concerns that not only deal with national security, but with our own (and with our privacy) as well.
Un altro libro che si dilunga in quanto sará brutto il nostro futuro a causa del cyber spionaggio che possa poi essere usato da hacker o dai poteri forti. Mi chiedo se e quanto sará possibile controllare quanto attualmente ci é impossibile tenere sotto controllo, sia per cause esterne che governative. Mette paura.

