| |
| |
Preface | |
| |
| |
Introduction | |
| |
| |
| |
The Worldwide Network | |
| |
| |
| |
The Internet After Thirty Years | |
| |
| |
| |
| |
Cyberspace Attacks and Countermeasures | |
| |
| |
| |
| |
Rome Laboratory Attacks: Prepared Testimony of Jim Christy, Air Force Investigator, Before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee | |
| |
| |
| |
| |
Reviewing the Risks Archives | |
| |
| |
| |
| |
Securing the Information Infrastructure | |
| |
| |
| |
| |
Computer Viruses | |
| |
| |
| |
| |
Internet Security | |
| |
| |
| |
An Evening with Berferd | |
| |
| |
| |
| |
Network and Internet Security | |
| |
| |
| |
| |
Internet Sniffer Attacks | |
| |
| |
| |
| |
Attack Class: Address Spoofing | |
| |
| |
| |
| |
Passwords | |
| |
| |
| |
| |
Location-Based Authentication: Grounding Cyberspace for Better Security | |
| |
| |
| |
| |
Tripwire: A Case Study in Integrity Monitoring | |
| |
| |
| |
| |
DIDS (Distributed Intrusion Detection System)- Motivation, Achitecture, and an Early Prototype | |
| |
| |
| |
| |
Test Driving SATAN Ted Doty | |
| |
| |
| |
Java Security: Web Browsers and Beyond Drew Dean | |
| |
| |
| |
| |
Cryptography | |
| |
| |
| |
A Brief History of the Data Encryption Standard | |
| |
| |
| |
| |
Wisecrackers | |
| |
| |
| |
| |
Internet Privacy Enhanced Mail | |
| |
| |
| |
| |
Authentication for Distributed Systems | |
| |
| |
| |
| |
A Taxonomy for Key Recovery Encryption Systems | |
| |
| |
| |
| |
Secure Electronic Commerce | |
| |
| |
| |
Electronic Commerce | |
| |
| |
| |
| |
Atomicity in Electronic Commerce | |
| |
| |
| |
| |
Securing the Commercial Internet | |
| |
| |
| |
| |
Money in Electronic Commerce: Digital Cash, Electronic Fund Transfers, and Ecash | |
| |
| |
| |
| |
Identity-Related Misuse | |
| |
| |
| |
| |
Law, Policy And Education | |
| |
| |
| |
Law Enforcement in Cyberspace Address The Honorable Janet Reno, United States Attorney General | |
| |
| |
| |
Encryption Policy and Market Trends | |
| |
| |
| |
| |
Remarks at Computers, Freedom and Privacy Conference IV Chicago | |
| |
| |
| |
| |
Speech to High Technology Crime Investigation Association Lake Tahoe | |
| |
| |
| |
| |
Are Computer Hacker Break-ins Ethical? | |
| |
| |
| |
| |
Georgetown University Computer Systems Acceptable Use Policy | |
| |
| |
| |
University Administrative Policy Number 60 RESPONSIBLE OFFICE: Vice Provost for Information Technology and Services | |
| |
| |
| |
Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles Major Gregory White and Captain | |
| |
| |
| |
Biographies | |
| |
| |
Index | |