Star Wars Sale
 
 

Special Offers see all

Enter to WIN!

Weekly drawing for $100 credit. Subscribe to PowellsBooks.news for a chance to win.
Privacy Policy

More at Powell's


Recently Viewed clear list


Original Essays | June 20, 2014

Lisa Howorth: IMG So Many Books, So Many Writers



I'm not a bookseller, but I'm married to one, and Square Books is a family. And we all know about families and how hard it is to disassociate... Continue »
  1. $18.20 Sale Hardcover add to wish list

    Flying Shoes

    Lisa Howorth 9781620403013

spacer
Qualifying orders ship free.
$1.48
List price: $45.50
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
3 Local Warehouse Networking- Computer Security

More copies of this ISBN

Internet Besieged (ACM Press)

by

Internet Besieged (ACM Press) Cover

 

Synopses & Reviews

Publisher Comments:

Break-ins on the Internet! Assaults on privacy! Theft of information!

Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce.

Internet Besieged consists of over thirty original and recently published chapters written by leading figures in security. They range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks.

Internet Besieged is organized for the general reader as well as the practicing professional. It covers:

  • The emergence of the Internet-the evolution of security problems and required countermeasures
  • Major patterns of weakness in Internet-connected computer systems and methods for preventing and detecting attacks
  • The use of cryptography to secure computers and data on the Internet
  • Electronic commerce and secure transactions-authentication and integrity-checking technologies; foiling identity theft
  • Ethics, laws, practices, and policies that govern human interaction on the Internet

For software developers, system managers and engineers, students, and concerned citizens, this book provides a broad awareness of Internet security risk while exploring the social, legal, political, and ethical implications of security breaches and suggested countermeasures.

Contributors include: Steve Bellovin, Matt Bishop, Bill Cheswick, Jim Christy, Stephen T. Kent, Steven Levy, Teresa Lunt, Peter G. Neumann, E. Eugene Schultz, Eugene H. Spafford, and Bruce Sterling.

0201308207B04062001

Book News Annotation:

Thirty-four original and recently published chapters range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks. Coverage includes the evolution of security problems and required countermeasures; major patterns of weakness in Internet-connected systems; methods for preventing and detecting attacks; the use of cryptography; electronic commerce and secure transactions; and ethics, laws, practices and policies that govern human interaction on the Internet.
Annotation c. Book News, Inc., Portland, OR (booknews.com)

Synopsis:

Break-ins on the Internet! Assaults on privacy! Theft of information!

Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce.

Internet Besieged consists of over thirty original and recently published chapters written by leading figures in security. They range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks.

Internet Besieged is organized for the general reader as well as the practicing professional. It covers:

  • The emergence of the Internet-the evolution of security problems and required countermeasures
  • Major patterns of weakness in Internet-connected computer systems and methods for preventing and detecting attacks
  • The use of cryptography to secure computers and data on the Internet
  • Electronic commerce and secure transactions-authentication and integrity-checking technologies; foiling identity theft
  • Ethics, laws, practices, and policies that govern human interaction on the Internet

For software developers, system managers and engineers, students, and concerned citizens, this book provides a broad awareness of Internet security risk while exploring the social, legal, political, and ethical implications of security breaches and suggested countermeasures.

Contributors include: Steve Bellovin, Matt Bishop, Bill Cheswick, Jim Christy, Stephen T. Kent, Steven Levy, Teresa Lunt, Peter G. Neumann, E. Eugene Schultz, Eugene H. Spafford, and Bruce Sterling.

0201308207B04062001

About the Author

Peter J. Denning is vice provost for continuing professional education at George Mason University. Denning was president of the Association for Computing (ACM) and is now chair of the ACM Publications Board. His two most recent books are Computers Under Attack and Beyond Calculation: The Next 50 Years of Computing.

Dorothy E. Denning is Professor of Computer Science at Georgetown University. She is the author of a classic book in the field, Cryptography and Data Security, a coeditor (with Peter J. Denning) of a more recent work, #LINK< Internet Besieged: Countering Cyberspace Scofflaws >#, and the author of 100 papers on computer security. Dr. Denning has shared her special expertise on encryption in testimony before the U.S. Congress.

0201308207AB04062001

Table of Contents

Preface.

Introduction.

I. THE WORLDWIDE NETWORK.

1. The Internet After Thirty Years Peter J. Denning.

2. Cyberspace Attacks and Countermeasures Dorothy E. Denning.

3. Rome Laboratory Attacks: Prepared Testimony of Jim Christy, Air Force Investigator, Before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee Jim Christy.

4. Reviewing the Risks Archives Peter G. Neumann.

5. Securing the Information Infrastructure Teresa Lunt.

6. Computer Viruses Eugene H. Spafford.

II. INTERNET SECURITY.

7. An Evening with Berferd William Cheswick.

8. Network and Internet Security Steve Bellovin.

9. Internet Sniffer Attacks E. Eugene Schultz and Thomas A. Longstaff.

10. Attack Class: Address Spoofing L. Todd Heberlein and Matt Bishop.

11. Passwords Peter J. Denning.

12. Location-Based Authentication: Grounding Cyberspace for Better Security Dorothy E. Denning and Peter F. MacDoran.

13. Tripwire: A Case Study in Integrity Monitoring Gene H. Kim and Eugene H. Spafford.

14. DIDS (Distributed Intrusion Detection System)- Motivation, Achitecture, and an Early Prototype Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, L. Todd Heberlein, Che-Lin Ho, Karl N. Levitt, Biswanath Mukherjee, Stephen E. Smaha, Tim Grance, Daniel M. Teal, and Doug Mansur.

15. Test Driving SATAN Ted Doty.

16. Java Security: Web Browsers and Beyond Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz.

III. CRYPTOGRAPHY.

17. A Brief History of the Data Encryption Standard Walter Tuchman.

18. Wisecrackers Steven Levy.

19. Internet Privacy Enhanced Mail Stephen T. Kent.

20. Authentication for Distributed Systems Thomas Y.C. Woo and Simon S. Lam.

21. A Taxonomy for Key Recovery Encryption Systems Dorothy E. Denning and Dennis K. Branstad.

IV. SECURE ELECTRONIC COMMERCE.

22. Electronic Commerce Peter J. Denning.

23. Atomicity in Electronic Commerce J. D. Tygar.

24. Securing the Commercial Internet Anish Bhimani.

25. Money in Electronic Commerce: Digital Cash, Electronic Fund Transfers, and Ecash Patiwat Panurach.

26. Identity-Related Misuse Peter G. Neumann.

V. LAW, POLICY AND EDUCATION.

27. Law Enforcement in Cyberspace Address The Honorable Janet Reno, United States Attorney General.

28. Encryption Policy and Market Trends Dorothy E. Denning.

29. Remarks at Computers, Freedom and Privacy Conference IV Chicago Bruce Sterling.

30. Speech to High Technology Crime Investigation Association Lake Tahoe Bruce Sterling.

31. Are Computer Hacker Break-ins Ethical? Eugene H. Spafford.

32. Georgetown University Computer Systems Acceptable Use Policy.

33. University Administrative Policy Number 60 RESPONSIBLE OFFICE: Vice Provost for Information Technology and Services.

34. Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles Major Gregory White and Captain Gregory Nordstrom.

Biographies.

Index.

Product Details

ISBN:
9780201308204
Preface:
Denning, Peter J.
Preface:
Denning, Peter J.
Preface by:
Denning, Peter J.
Preface:
Denning, Peter J.
Author:
Denning, Dorothy E. Robling
Author:
Denning, Peter J.
Author:
Denning, Dorothy E.
Author:
Denning, Peter J.
Publisher:
Addison-Wesley Professional
Location:
New York, N.Y. :
Subject:
Internet - General
Subject:
Technology
Subject:
Computers and computer technology
Subject:
Networking - General
Subject:
Computer networks
Subject:
Electronic Commerce
Subject:
Computer crimes
Subject:
Computer security
Subject:
Internet - Security
Subject:
Security
Subject:
Internet
Subject:
Internet (Computer network) -- Security measures.
Subject:
Security - General
Copyright:
Edition Description:
Trade paper
Series:
ACM Press
Series Volume:
463
Publication Date:
October 1997
Binding:
TRADE PAPER
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Yes
Pages:
560
Dimensions:
9 x 6.2 x 1.3 in 726 gr

Other books you might like

  1. The New Liberalism: The Rising Power... New Trade Paper $22.50
  2. Cauldron of transformation :a new... Used Trade Paper $9.95
  3. Likeness and Presence: A History of... New Trade Paper $74.25
  4. Selected Letters of Charles Sumner 2... Used Hardcover $12.50
  5. No disrespect Used Hardcover $7.50
  6. The Christmas Cat Used Hardcover $3.95

Related Subjects

Arts and Entertainment » Music » Instruction and Study » Techniques
Arts and Entertainment » Music » Instruments » Piano and Keyboard
Children's » General
Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Religion » Comparative Religion » General
Science and Mathematics » Mathematics » General

Internet Besieged (ACM Press) Used Trade Paper
0 stars - 0 reviews
$1.48 In Stock
Product details 560 pages Addison-Wesley Professional - English 9780201308204 Reviews:
"Synopsis" by , Break-ins on the Internet! Assaults on privacy! Theft of information!

Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce.

Internet Besieged consists of over thirty original and recently published chapters written by leading figures in security. They range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks.

Internet Besieged is organized for the general reader as well as the practicing professional. It covers:

  • The emergence of the Internet-the evolution of security problems and required countermeasures
  • Major patterns of weakness in Internet-connected computer systems and methods for preventing and detecting attacks
  • The use of cryptography to secure computers and data on the Internet
  • Electronic commerce and secure transactions-authentication and integrity-checking technologies; foiling identity theft
  • Ethics, laws, practices, and policies that govern human interaction on the Internet

For software developers, system managers and engineers, students, and concerned citizens, this book provides a broad awareness of Internet security risk while exploring the social, legal, political, and ethical implications of security breaches and suggested countermeasures.

Contributors include: Steve Bellovin, Matt Bishop, Bill Cheswick, Jim Christy, Stephen T. Kent, Steven Levy, Teresa Lunt, Peter G. Neumann, E. Eugene Schultz, Eugene H. Spafford, and Bruce Sterling.

0201308207B04062001

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.