Decrypting the Encryption Debate

Download Decrypting the Encryption Debate PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309471532
Total Pages : 119 pages
Book Rating : 4.3/5 (94 download)

DOWNLOAD NOW!


Book Synopsis Decrypting the Encryption Debate by : National Academies of Sciences, Engineering, and Medicine

Download or read book Decrypting the Encryption Debate written by National Academies of Sciences, Engineering, and Medicine and published by National Academies Press. This book was released on 2018-06-07 with total page 119 pages. Available in PDF, EPUB and Kindle. Book excerpt: Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.

Decrypting the Encryption Debate

Download Decrypting the Encryption Debate PDF Online Free

Author :
Publisher :
ISBN 13 : 9780309471541
Total Pages : 104 pages
Book Rating : 4.4/5 (715 download)

DOWNLOAD NOW!


Book Synopsis Decrypting the Encryption Debate by : National Academies of Sciences, Engineering, and Medicine (U.S.). Committee on Law Enforcement and Intelligence Access to Plaintext Information

Download or read book Decrypting the Encryption Debate written by National Academies of Sciences, Engineering, and Medicine (U.S.). Committee on Law Enforcement and Intelligence Access to Plaintext Information and published by . This book was released on 2018 with total page 104 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information"--Publisher's description

The Encryption Debate

Download The Encryption Debate PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 120 pages
Book Rating : 4.0/5 ( download)

DOWNLOAD NOW!


Book Synopsis The Encryption Debate by : United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information

Download or read book The Encryption Debate written by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information and published by . This book was released on 1998 with total page 120 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Decrypting the Encryption Debate

Download Decrypting the Encryption Debate PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309471567
Total Pages : 119 pages
Book Rating : 4.3/5 (94 download)

DOWNLOAD NOW!


Book Synopsis Decrypting the Encryption Debate by : National Academies of Sciences, Engineering, and Medicine

Download or read book Decrypting the Encryption Debate written by National Academies of Sciences, Engineering, and Medicine and published by National Academies Press. This book was released on 2018-05-07 with total page 119 pages. Available in PDF, EPUB and Kindle. Book excerpt: Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.

Cryptography's Role in Securing the Information Society

Download Cryptography's Role in Securing the Information Society PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309175801
Total Pages : 720 pages
Book Rating : 4.3/5 (91 download)

DOWNLOAD NOW!


Book Synopsis Cryptography's Role in Securing the Information Society by : National Research Council

Download or read book Cryptography's Role in Securing the Information Society written by National Research Council and published by National Academies Press. This book was released on 1996-10-29 with total page 720 pages. Available in PDF, EPUB and Kindle. Book excerpt: For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptographyâ€"the representation of messages in codeâ€"and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examplesâ€"some alarming and all instructiveâ€"from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.

The Effect of Encryption on Lawful Access to Communications and Data

Download The Effect of Encryption on Lawful Access to Communications and Data PDF Online Free

Author :
Publisher : Rowman & Littlefield
ISBN 13 : 1442279966
Total Pages : 46 pages
Book Rating : 4.4/5 (422 download)

DOWNLOAD NOW!


Book Synopsis The Effect of Encryption on Lawful Access to Communications and Data by : James A. Lewis

Download or read book The Effect of Encryption on Lawful Access to Communications and Data written by James A. Lewis and published by Rowman & Littlefield. This book was released on 2017-03-20 with total page 46 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Internet has become central to global economic activity, politics, and security, and the security environment has changed recently, as we face much more aggressive state actors in espionage. Terrorists and criminals find creative ways to leverage the latest technologies to evade security and privacy protections, but there may be technical and policy solutions that can balance national security and public safety with protection of privacy, civil liberties, and a functioning global Internet ecosystem.

Computers at Risk

Download Computers at Risk PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309043883
Total Pages : 320 pages
Book Rating : 4.3/5 (9 download)

DOWNLOAD NOW!


Book Synopsis Computers at Risk by : National Research Council

Download or read book Computers at Risk written by National Research Council and published by National Academies Press. This book was released on 1990-02-01 with total page 320 pages. Available in PDF, EPUB and Kindle. Book excerpt: Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

Building in Big Brother

Download Building in Big Brother PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 1461225248
Total Pages : 565 pages
Book Rating : 4.4/5 (612 download)

DOWNLOAD NOW!


Book Synopsis Building in Big Brother by : Lance J. Hoffman

Download or read book Building in Big Brother written by Lance J. Hoffman and published by Springer Science & Business Media. This book was released on 2012-12-06 with total page 565 pages. Available in PDF, EPUB and Kindle. Book excerpt: The announcement of the Clipper chip by the U.S. Government in April 1993 set off a frenzy of discussions about cryptography policy in the technological community. The shock waves from it ultimately included front page treatment in The New York Times, repeated questions to the Vice President, creation of several new newsgroups on the Internet, and some very productive public discussions about striking the balance between national security, law enforcement, and civil liberties. We still don't have good answers for some of the questions that have been raised. As the Global Information Infrastructure is being built, we are writing portions of the Constitution for Cyberspace. I've been fortunate to have a front row seat and to share much of this with my students. The original reading and selection of materials was made by the first cohort of students* in The George Washington University Accel erated Master of Science Program in Telecommunications and Com puters at the Ashburn, Virginia campus. They worked many long hours-reading, debating, and selecting materials for this book. In addition, Bob Patton spent a great deal of time scanning and editing the material. Nestor Torres prepared the index. And Harish Nalinak shan provided an enormous amount of technical and administrative assistance and kept the project on track as new developments took place in the debate and new papers and legislation reflected these. As with most readings books, some of the selections cover similar material. We have tried to hold this duplication to an acceptable level.

Blown to Bits

Download Blown to Bits PDF Online Free

Author :
Publisher : Addison-Wesley Professional
ISBN 13 : 0134850033
Total Pages : 403 pages
Book Rating : 4.1/5 (348 download)

DOWNLOAD NOW!


Book Synopsis Blown to Bits by : Hal Abelson

Download or read book Blown to Bits written by Hal Abelson and published by Addison-Wesley Professional. This book was released on 2021-03-08 with total page 403 pages. Available in PDF, EPUB and Kindle. Book excerpt: What you must know to protect yourself today The digital technology explosion has blown everything to bits—and the blast has provided new challenges and opportunities. This second edition of Blown to Bits delivers the knowledge you need to take greater control of your information environment and thrive in a world that's coming whether you like it or not. Straight from internationally respected Harvard/MIT experts, this plain-English bestseller has been fully revised for the latest controversies over social media, “fake news,” big data, cyberthreats, privacy, artificial intelligence and machine learning, self-driving cars, the Internet of Things, and much more. • Discover who owns all that data about you—and what they can infer from it • Learn to challenge algorithmic decisions • See how close you can get to sending truly secure messages • Decide whether you really want always-on cameras and microphones • Explore the realities of Internet free speech • Protect yourself against out-of-control technologies (and the powerful organizations that wield them) You'll find clear explanations, practical examples, and real insight into what digital tech means to you—as an individual, and as a citizen.

Cryptography Engineering

Download Cryptography Engineering PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1118080912
Total Pages : 532 pages
Book Rating : 4.1/5 (18 download)

DOWNLOAD NOW!


Book Synopsis Cryptography Engineering by : Niels Ferguson

Download or read book Cryptography Engineering written by Niels Ferguson and published by John Wiley & Sons. This book was released on 2011-02-02 with total page 532 pages. Available in PDF, EPUB and Kindle. Book excerpt: The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Practical Cryptography in Python

Download Practical Cryptography in Python PDF Online Free

Author :
Publisher : Apress
ISBN 13 : 1484249003
Total Pages : 380 pages
Book Rating : 4.4/5 (842 download)

DOWNLOAD NOW!


Book Synopsis Practical Cryptography in Python by : Seth James Nielson

Download or read book Practical Cryptography in Python written by Seth James Nielson and published by Apress. This book was released on 2019-09-27 with total page 380 pages. Available in PDF, EPUB and Kindle. Book excerpt: Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll Learn Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic propertiesGet up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations breakUse message integrity and/or digital signatures to protect messagesUtilize modern symmetric ciphers such as AES-GCM and CHACHAPractice the basics of public key cryptography, including ECDSA signaturesDiscover how RSA encryption can be broken if insecure padding is usedEmploy TLS connections for secure communicationsFind out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs Who This Book Is For IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.

Applied Cryptography

Download Applied Cryptography PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119439027
Total Pages : 937 pages
Book Rating : 4.1/5 (194 download)

DOWNLOAD NOW!


Book Synopsis Applied Cryptography by : Bruce Schneier

Download or read book Applied Cryptography written by Bruce Schneier and published by John Wiley & Sons. This book was released on 2017-05-25 with total page 937 pages. Available in PDF, EPUB and Kindle. Book excerpt: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Blown to Bits

Download Blown to Bits PDF Online Free

Author :
Publisher : Addison-Wesley Professional
ISBN 13 : 0137135599
Total Pages : 389 pages
Book Rating : 4.1/5 (371 download)

DOWNLOAD NOW!


Book Synopsis Blown to Bits by : Harold Abelson

Download or read book Blown to Bits written by Harold Abelson and published by Addison-Wesley Professional. This book was released on 2008 with total page 389 pages. Available in PDF, EPUB and Kindle. Book excerpt: 'Blown to Bits' is about how the digital explosion is changing everything. The text explains the technology, why it creates so many surprises and why things often don't work the way we expect them to. It is also about things the information explosion is destroying: old assumptions about who is really in control of our lives.

The Encryption Debate

Download The Encryption Debate PDF Online Free

Author :
Publisher :
ISBN 13 : 9780788187681
Total Pages : 0 pages
Book Rating : 4.1/5 (876 download)

DOWNLOAD NOW!


Book Synopsis The Encryption Debate by : Jon Kyl

Download or read book The Encryption Debate written by Jon Kyl and published by . This book was released on 2000-05 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Explores how encryption is affecting the way we deal with criminals, terrorists, and the security needs of businesses. Witnesses: Louis Freeh, Dir., FBI; Dorothy Denning, prof. of computer sciences, Georgetown Univ.; William Baugh, Jr., v.p., Science Applications Internat. Corp., McLean, VA; Jeffery Herig, special agent and program coord., Computer Evidence Recovery Section, Florida Dept. of Law Enforcement; Robert Burke, chmn., Committee for Protection of Info. and Tech., Overseas, Security Advisory Council, Dept. of State; R. Patrick Watson, dir., Worldwide Corp. Sec., Eastman Kodak Co.; and Kenneth Lieberman, sr. v.p. for Corp. Risk Mgmt., Visa USA.

Introduction to Modern Cryptography

Download Introduction to Modern Cryptography PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1351133012
Total Pages : 435 pages
Book Rating : 4.3/5 (511 download)

DOWNLOAD NOW!


Book Synopsis Introduction to Modern Cryptography by : Jonathan Katz

Download or read book Introduction to Modern Cryptography written by Jonathan Katz and published by CRC Press. This book was released on 2020-12-21 with total page 435 pages. Available in PDF, EPUB and Kindle. Book excerpt: Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.

Federal Statistics, Multiple Data Sources, and Privacy Protection

Download Federal Statistics, Multiple Data Sources, and Privacy Protection PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309465370
Total Pages : 195 pages
Book Rating : 4.3/5 (94 download)

DOWNLOAD NOW!


Book Synopsis Federal Statistics, Multiple Data Sources, and Privacy Protection by : National Academies of Sciences, Engineering, and Medicine

Download or read book Federal Statistics, Multiple Data Sources, and Privacy Protection written by National Academies of Sciences, Engineering, and Medicine and published by National Academies Press. This book was released on 2018-01-27 with total page 195 pages. Available in PDF, EPUB and Kindle. Book excerpt: The environment for obtaining information and providing statistical data for policy makers and the public has changed significantly in the past decade, raising questions about the fundamental survey paradigm that underlies federal statistics. New data sources provide opportunities to develop a new paradigm that can improve timeliness, geographic or subpopulation detail, and statistical efficiency. It also has the potential to reduce the costs of producing federal statistics. The panel's first report described federal statistical agencies' current paradigm, which relies heavily on sample surveys for producing national statistics, and challenges agencies are facing; the legal frameworks and mechanisms for protecting the privacy and confidentiality of statistical data and for providing researchers access to data, and challenges to those frameworks and mechanisms; and statistical agencies access to alternative sources of data. The panel recommended a new approach for federal statistical programs that would combine diverse data sources from government and private sector sources and the creation of a new entity that would provide the foundational elements needed for this new approach, including legal authority to access data and protect privacy. This second of the panel's two reports builds on the analysis, conclusions, and recommendations in the first one. This report assesses alternative methods for implementing a new approach that would combine diverse data sources from government and private sector sources, including describing statistical models for combining data from multiple sources; examining statistical and computer science approaches that foster privacy protections; evaluating frameworks for assessing the quality and utility of alternative data sources; and various models for implementing the recommended new entity. Together, the two reports offer ideas and recommendations to help federal statistical agencies examine and evaluate data from alternative sources and then combine them as appropriate to provide the country with more timely, actionable, and useful information for policy makers, businesses, and individuals.

Codes and Ciphers

Download Codes and Ciphers PDF Online Free

Author :
Publisher : Cambridge University Press
ISBN 13 : 9780521008907
Total Pages : 254 pages
Book Rating : 4.0/5 (89 download)

DOWNLOAD NOW!


Book Synopsis Codes and Ciphers by : R. F. Churchhouse

Download or read book Codes and Ciphers written by R. F. Churchhouse and published by Cambridge University Press. This book was released on 2002 with total page 254 pages. Available in PDF, EPUB and Kindle. Book excerpt: Publisher Description