Skip to content

Internet Besieged Countering Cyberspace Scofflaws

Best in textbook rentals since 2012!

ISBN-10: 0201308207

ISBN-13: 9780201308204

Edition: 1998

Authors: Dorothy Denning, Peter Denning, ACM Press Staff

List price: $39.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Internet Besieged features interesting, alarming, original, and recently published writing about the vulnerability of the computer networks we use every day, and timely recommendations for strengthening network security. More than thirty chapters by leading figures in the field of security range from fairly technical explanations of encryption and detection systems to popular accounts of hacker attacks and the cyberpunk subculture. The book provides a history of awareness of Internet security risks while exploring the social, legal, political, and ethical implications of these security breaches and their suggested countermeasures.
Customers also bought

Book details

List price: $39.95
Copyright year: 1998
Publisher: Addison Wesley Professional
Publication date: 10/3/1997
Binding: Paperback
Pages: 560
Size: 9.21" wide x 6.22" long x 1.10" tall
Weight: 1.650
Language: English

Preface
Introduction
The Worldwide Network
The Internet After Thirty Years
Cyberspace Attacks and Countermeasures
Rome Laboratory Attacks: Prepared Testimony of Jim Christy, Air Force Investigator, Before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee
Reviewing the Risks Archives
Securing the Information Infrastructure
Computer Viruses
Internet Security
An Evening with Berferd
Network and Internet Security
Internet Sniffer Attacks
Attack Class: Address Spoofing
Passwords
Location-Based Authentication: Grounding Cyberspace for Better Security
Tripwire: A Case Study in Integrity Monitoring
DIDS (Distributed Intrusion Detection System)- Motivation, Achitecture, and an Early Prototype
Test Driving SATAN Ted Doty
Java Security: Web Browsers and Beyond Drew Dean
Cryptography
A Brief History of the Data Encryption Standard
Wisecrackers
Internet Privacy Enhanced Mail
Authentication for Distributed Systems
A Taxonomy for Key Recovery Encryption Systems
Secure Electronic Commerce
Electronic Commerce
Atomicity in Electronic Commerce
Securing the Commercial Internet
Money in Electronic Commerce: Digital Cash, Electronic Fund Transfers, and Ecash
Identity-Related Misuse
Law, Policy And Education
Law Enforcement in Cyberspace Address The Honorable Janet Reno, United States Attorney General
Encryption Policy and Market Trends
Remarks at Computers, Freedom and Privacy Conference IV Chicago
Speech to High Technology Crime Investigation Association Lake Tahoe
Are Computer Hacker Break-ins Ethical?
Georgetown University Computer Systems Acceptable Use Policy
University Administrative Policy Number 60 RESPONSIBLE OFFICE: Vice Provost for Information Technology and Services
Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles Major Gregory White and Captain
Biographies
Index