Books

23 Items

Book - W.W. Norton & Company

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back

| February 2023

A hack is any means of subverting a system’s rules in unintended ways. In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to democracy. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.

Book Chapter - Oxford University Press

Israel's National Security Policy

| 2019

This article presents both the fundamental changes that have taken place in Israel's strategic environment, from conventional, state-based threats to primarily asymmetrical ones, and the responses it has developed to date. It also addresses Israel's relations with the United States and other primary international actors, as well as Israel's nuclear and regional arms control policy.

Book - Random House/Crown

The Perfect Weapon

| June 19, 2018

For 70 years, the thinking inside the Pentagon was that only nations with nuclear weapons could threaten America’s existence. But that assumption is now in doubt: in a world in which almost everything is interconnected – phones, cars, electrical grids, and satellites – everything can be disrupted, if not destroyed. In THE PERFECT WEAPON, Belfer Center Senior Fellow and Adjunct Lecturer in Public Policy David Sanger, the New York Times national security correspondent, details how this new revolution, being conducted largely in secret, is reshaping global power.

Book - Oxford University Press

The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations

Feb. 01, 2017

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well.