No Conquest, No Defeat


Book Description

In early 2019, the Islamic Republic of Iran marked its fortieth anniversary, despite decades of isolation, political pressure, sanctions and war. Observers of its security policies continue to try and make sense of this unlikely endurance. Some view the regime as a purely rational actor, whose national security decisions and military affairs are shaped by the same considerations as in other states. Others believe that it is ideology driving Tehran's strategy. Either way, virtually everyone agrees that the mullahs' policies are fundamentally different from those pursued by their monarchical predecessors. No Conquest, No Defeat offers a historically grounded overview of Iranian national security. Tabatabai argues that the Islamic Republic is neither completely rational nor purely ideological. Rather, its national security policy today is largely shaped by its strategic culture, a product of the country's historical experiences of war and peace. As a result, Iranian strategic thinking is perhaps best characterized by its dynamic yet resilient nature, one that is continually evolving. As the Islamic Republic enters its fifth decade, this book sheds new light on Iran's controversial nuclear and missile programs and its involvement in Afghanistan, Iraq, Lebanon, Syria and Yemen.




No Place for Russia


Book Description

The optimistic vision of a “Europe whole and free” after the fall of the Berlin Wall in 1989 has given way to disillusionment, bitterness, and renewed hostility between Russia and the West. In No Place for Russia, William H. Hill traces the development of the post–Cold War European security order to explain today’s tensions, showing how attempts to integrate Russia into a unified Euro-Atlantic security order were gradually overshadowed by the domination of NATO and the EU—at Russia’s expense. Hill argues that the redivision of Europe has been largely unintended and not the result of any single decision or action. Instead, the current situation is the cumulative result of many decisions—reasonably made at the time—that gradually produced the current security architecture and led to mutual mistrust. Hill analyzes the United States’ decision to remain in Europe after the Cold War, the emergence of Germany as a major power on the continent, and the transformation of Russia into a nation-state, placing major weight on NATO’s evolution from an alliance dedicated primarily to static collective territorial defense into a security organization with global ambitions and capabilities. Closing with Russia’s annexation of Crimea and war in eastern Ukraine, No Place for Russia argues that the post–Cold War security order in Europe has been irrevocably shattered, to be replaced by a new and as-yet-undefined order.




No Use


Book Description

For more than forty years, the United States has maintained a public commitment to nuclear disarmament, and every president from Ronald Reagan to Barack Obama has gradually reduced the size of America's nuclear forces. Yet even now, over two decades after the end of the Cold War, the United States maintains a huge nuclear arsenal on high alert and ready for war. The Americans, like the Russians, the Chinese, and other major nuclear powers, continue to retain a deep faith in the political and military value of nuclear force, and this belief remains enshrined at the center of U.S. defense policy regardless of the radical changes that have taken place in international politics. In No Use, national security scholar Thomas M. Nichols offers a lucid, accessible reexamination of the role of nuclear weapons and their prominence in U.S. security strategy. Nichols explains why strategies built for the Cold War have survived into the twenty-first century, and he illustrates how America's nearly unshakable belief in the utility of nuclear arms has hindered U.S. and international attempts to slow the nuclear programs of volatile regimes in North Korea and Iran. From a solid historical foundation, Nichols makes the compelling argument that to end the danger of worldwide nuclear holocaust, the United States must take the lead in abandoning unrealistic threats of nuclear force and then create a new and more stable approach to deterrence for the twenty-first century.







Android Security Internals


Book Description

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys­tem. Elenkov describes Android security archi­tecture from the bottom up, delving into the imple­mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You’ll learn: –How Android permissions are declared, used, and enforced –How Android manages application packages and employs code signing to verify their authenticity –How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks –About Android’s credential storage system and APIs, which let applications store cryptographic keys securely –About the online account management framework and how Google accounts integrate with Android –About the implementation of verified boot, disk encryption, lockscreen, and other device security features –How Android’s bootloader and recovery OS are used to perform full system updates, and how to obtain root access With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.




The Internet in Everything


Book Description

A compelling argument that the Internet of things threatens human rights and security "Sobering and important."--Financial Times, "Best Books of 2020: Technology" The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of things--connecting everything from cars to cardiac monitors to home appliances--there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in loss of communication but also potentially in loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. Laura DeNardis argues that the diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and she offers new cyber-policy solutions. In her discussion, she makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future.




Security Engineering with Patterns


Book Description

For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.




In/security in Colombia


Book Description

Based on geo- and biopolitical analyses, this book reconsiders how security policies and practices legitimate state and non-state violence in the Colombian conflict. Using the case study of the official Democratic Security Policy (DSP), Echavarría examines how security discourses write the political identities of state, self and others. She claims that the DSP delimits politics, the political, and the imaginaries of peace and war through conditioning the possibilities for identity formation. In/security in Colombia offers an innovative application of a large theoretical framework on the performative character of security discourses and furthers a nuanced understanding of the security problematique in a postcolonial setting. This wide-reaching study will benefit students, scholars and policy-makers in the fields of security, peace and conflict, and Latin American issues.