Books about Authenticity™
Here you will find books about the state and future of the place we spend more and more of our time using the world’s information infrastructure – the Internet, phone networks, and our private computer networks. Anyone who spends time online or is interested in the translation of commercial, social, political, and community functions to the digital world will find indispensable information in our publications.
Our featured author, Wes Kussmaul, treats a variety of topics for both specialists and generalists. Whether you’re a security professional or a citizen of the digital world concerned about the future of your interactions online, these books provide an understanding of today's digital culture and how to bring accountability AND real privacy to your online world.
Bring security with privacy to your networks and your life.
The solution to the Internet's problems - spam, malware, botnets, predation, fraud is available, but it cannot be deployed the way technology has historically been deployed.
This book is for thought leaders and entrepreneurs who are interested in a new way of doing things that will reshape security and privacy in our information infrastructure. The technologies involved include public key infrastructure (PKI), authentication methods, identity management, and much more. One chapter addresses each of the ten historical difficulties faced by PKI, as cited by Schneier and Ellison in their famous paper, and the specific way in which the Quiet Enjoyment Infrastructure (QEI) addresses each of those concerns.
"Quiet enjoyment" is the legal term for what a building occupant has a right to expect in any jurisdiction in the world: a manageable space where people can work or play in peace and security.
By designing, building, and managing habitable online spaces using the same methods and procedures that are used with physical real estate, and with PKI "construction materials," InDoor® online facilities can be places of quiet enjoyment.
In this book you'll learn how the Quiet Enjoyment Infrastructure applies the methods and procedures of commercial real estate, along with public key technology, to give us what we need from our online spaces
Security technology is today's bloodletting.
Like bloodletting, it doesn't work!
This breach caused 1000 times the $250 million
losses of the Equifax incident
Security technology is not working. Without measurably reliable identities and accountability, your door is wide open to nefarious action by intruders and inside bad actors. Read how the unthinkable happened to a multi-billion-dollar company that spiraled into bankruptcy because of a shockingly elementary — and preventable — breach.
So ask yourself: Is it possible to determine the intentions and character of the sender of a stream of bits? Isn't that like asking your building's receptionist to determine the intentions and character of everyone who walks through the door?
Of course you wouldn't do that. Instead, you would have the receptionist issue a badge identifying who is responsible for what happens while they're in the building. It's not about guard dogs and razor wire, it's about accountability.
If your company is relying upon firewalls and intrusion detection systems and intrusion prevention systems and antimalware and security information event monitoring and similar stuff, it's relying upon the assumption that you can determine the intentions and character of the sender of a stream of bits.
In Don't Get Norteled you'll learn why identity is at least as important as identity management, and you'll learn how to implement a system of pervasive digital signatures from measurably reliable identity credentials.
Silicon Valley, the NSA, and the botnet builders intend to own you.
Here's how you
can stop them.
The principal money-making asset of the large search, digital media, and social networking companies is the information that identifies your purchase habits, relationships, and political affiliations.
In the digital age, information about you is the digital you. And so those big organizations consider you to be their property. Learn how the Authenticity Economy will deliver privacy for you and accountability from others – and will let you claim ownership of yourself.
The world has entered its second paperless age.
In the first paperless age, the Roman Tabellio Notaries kept records of deeds on wax tablets, and were paid very well for their important role in society.
Fast forward a couple thousand years. Our paperless digital world is utterly devoid of the accountability that notaries provide. Result: pervasive digital identity fraud leading to breaches, ransomware, computer and phone viruses, and on and on.
In this book you’ll learn how adding the Attestation Officer designation to your role as a notary public will make you an integral part of the solution to the world’s epidemic of inauthenticity.