Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.
-
Creators
-
Publisher
-
Release date
December 1, 2015 -
Formats
-
OverDrive Listen audiobook
- ISBN: 9781469095424
- File size: 125505 KB
- Duration: 04:21:28
-
-
Languages
- English
Formats
- OverDrive Listen audiobook
Languages
- English
Why is availability limited?
×Availability can change throughout the month based on the library's budget. You can still place a hold on the title, and your hold will be automatically filled as soon as the title is available again.
The Kindle Book format for this title is not supported on:
×Read-along ebook
×The OverDrive Read format of this ebook has professional narration that plays while you read in your browser. Learn more here.