Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret。 Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment。 In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards。 In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables。 A terrific read for security professionals and general readers alike。 --David Wall
Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway。 Mostly, this takes the form of essays (about, for example, how the U。S。 Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet)。 Sections deal with technologies, policies, psychology, and legal matters。