Sold Out
Book Categories |
Preface | ||
Introduction | 1 | |
Pt. I | The Worldwide Network | 11 |
Ch. 1 | The Internet after Thirty Years | 15 |
Ch. 2 | Cyberspace Attacks and Countermeasures | 29 |
Ch. 3 | Rome Laboratory Attacks: Prepared Testimony of Jim Christy, Air Force Investigator, before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee | 57 |
Ch. 4 | Reviewing the Risks Archives | 67 |
Ch. 5 | Securing the Information Infrastructure | 71 |
Ch. 6 | Computer Viruses | 73 |
Pt. II | Internet Security | 97 |
Ch. 7 | An Evening with Berferd | 103 |
Ch. 8 | Network and Internet Security | 117 |
Ch. 9 | Internet Sniffer Attacks | 137 |
Ch. 10 | Attack Class: Address Spoofing | 147 |
Ch. 11 | Passwords | 159 |
Ch. 12 | Location-based Authentication: Grounding Cyberspace for Better Security | 167 |
Ch. 13 | Tripwire: A Case Study in Integrity Monitoring | 175 |
Ch. 14 | DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an Early Prototype | 211 |
Ch. 15 | Test Driving SATAN | 229 |
Ch. 16 | Java Security: Web Browsers and Beyond | 241 |
Pt. III | Cryptography | 271 |
Ch. 17 | A Brief History of the Data Encryption Standard | 275 |
Ch. 18 | Wisecrackers | 281 |
Ch. 19 | Internet Privacy Enhanced Mail | 295 |
Ch. 20 | Authentication for Distributed Systems | 319 |
Ch. 21 | A Taxonomy for Key Recovery Encryption Systems | 357 |
Pt. IV | Secure Electronic Commerce | 373 |
Ch. 22 | Electronic Commerce | 377 |
Ch. 23 | Atomicity in Electronic Commerce | 389 |
Ch. 24 | Securing the Commercial Internet | 407 |
Ch. 25 | Money in Electronic Commerce: Digital Cash, Electronic Fund Transfers, and Ecash | 421 |
Ch. 26 | Identity-related Misuse | 433 |
Pt. V | Law, Policy, and Education | 437 |
Ch. 27 | Law Enforcement in Cyberspace Address | 439 |
Ch. 28 | Encryption Policy and Market Trends | 449 |
Ch. 29 | Remarks at Computers, Freedom, and Privacy Conference IV Chicago | 475 |
Ch. 30 | Speech to the High Technology Crime Investigation Association | 481 |
Ch. 31 | Are Computer Hacker Break-ins Ethical? | 493 |
Ch. 32 | Georgetown University Computer Systems Acceptable Use Policy | 507 |
Ch. 33 | University Administrative Policy Number 60 | 511 |
Ch. 34 | Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles | 519 |
Biographies | 527 | |
Index | 537 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInternet besieged
X
This Item is in Your InventoryInternet besieged
X
You must be logged in to review the productsX
X
X
Add Internet besieged, Assaults on privacy! Theft of information! Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni, Internet besieged to the inventory that you are selling on WonderClubX
X
Add Internet besieged, Assaults on privacy! Theft of information! Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingeni, Internet besieged to your collection on WonderClub |