Wonder Club world wonders pyramid logo
×

Internet besieged Book

Internet besieged
Internet besieged, Assaults on privacy! Theft of information! 
Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni, Internet besieged has a rating of 2 stars
   2 Ratings
X
Internet besieged, Assaults on privacy! Theft of information! Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni, Internet besieged
2 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
0 %
2
100 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Internet besieged
  • Written by author Dorothy E. Denning,Peter J. Denning
  • Published by Reading, Mass. : Addison Wesley, c1998., 1997/10/03
  • Assaults on privacy! Theft of information! Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface
Introduction 1
Pt. I The Worldwide Network 11
Ch. 1 The Internet after Thirty Years 15
Ch. 2 Cyberspace Attacks and Countermeasures 29
Ch. 3 Rome Laboratory Attacks: Prepared Testimony of Jim Christy, Air Force Investigator, before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee 57
Ch. 4 Reviewing the Risks Archives 67
Ch. 5 Securing the Information Infrastructure 71
Ch. 6 Computer Viruses 73
Pt. II Internet Security 97
Ch. 7 An Evening with Berferd 103
Ch. 8 Network and Internet Security 117
Ch. 9 Internet Sniffer Attacks 137
Ch. 10 Attack Class: Address Spoofing 147
Ch. 11 Passwords 159
Ch. 12 Location-based Authentication: Grounding Cyberspace for Better Security 167
Ch. 13 Tripwire: A Case Study in Integrity Monitoring 175
Ch. 14 DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an Early Prototype 211
Ch. 15 Test Driving SATAN 229
Ch. 16 Java Security: Web Browsers and Beyond 241
Pt. III Cryptography 271
Ch. 17 A Brief History of the Data Encryption Standard 275
Ch. 18 Wisecrackers 281
Ch. 19 Internet Privacy Enhanced Mail 295
Ch. 20 Authentication for Distributed Systems 319
Ch. 21 A Taxonomy for Key Recovery Encryption Systems 357
Pt. IV Secure Electronic Commerce 373
Ch. 22 Electronic Commerce 377
Ch. 23 Atomicity in Electronic Commerce 389
Ch. 24 Securing the Commercial Internet 407
Ch. 25 Money in Electronic Commerce: Digital Cash, Electronic Fund Transfers, and Ecash 421
Ch. 26 Identity-related Misuse 433
Pt. V Law, Policy, and Education 437
Ch. 27 Law Enforcement in Cyberspace Address 439
Ch. 28 Encryption Policy and Market Trends 449
Ch. 29 Remarks at Computers, Freedom, and Privacy Conference IV Chicago 475
Ch. 30 Speech to the High Technology Crime Investigation Association 481
Ch. 31 Are Computer Hacker Break-ins Ethical? 493
Ch. 32 Georgetown University Computer Systems Acceptable Use Policy 507
Ch. 33 University Administrative Policy Number 60 511
Ch. 34 Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles 519
Biographies 527
Index 537


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Internet besieged, Assaults on privacy! Theft of information! 
Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni, Internet besieged

X
WonderClub Home

This item is in your Collection

Internet besieged, Assaults on privacy! Theft of information! 
Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni, Internet besieged

Internet besieged

X
WonderClub Home

This Item is in Your Inventory

Internet besieged, Assaults on privacy! Theft of information! 
Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni, Internet besieged

Internet besieged

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: