Internet Besieged: Countering Cyberspace Scofflaws

Author:   Dorothy Denning ,  Peter Denning
Publisher:   Pearson Education Limited
ISBN:  

9780201308204


Pages:   560
Publication Date:   02 January 1998
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $105.47 Quantity:  
Add to Cart

Share |

Internet Besieged: Countering Cyberspace Scofflaws


Add your own review!

Overview

Full Product Details

Author:   Dorothy Denning ,  Peter Denning
Publisher:   Pearson Education Limited
Imprint:   Addison Wesley
Dimensions:   Width: 23.40cm , Height: 2.80cm , Length: 15.80cm
Weight:   0.748kg
ISBN:  

9780201308204


ISBN 10:   0201308207
Pages:   560
Publication Date:   02 January 1998
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Preface. Introduction. I. THE WORLDWIDE NETWORK. 1. The Internet After Thirty Years Peter J. Denning. 2. Cyberspace Attacks and Countermeasures Dorothy E. Denning. 3. Rome Laboratory Attacks: Prepared Testimony of Jim Christy, Air Force Investigator, Before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee Jim Christy. 4. Reviewing the Risks Archives Peter G. Neumann. 5. Securing the Information Infrastructure Teresa Lunt. 6. Computer Viruses Eugene H. Spafford. II. INTERNET SECURITY. 7. An Evening with Berferd William Cheswick. 8. Network and Internet Security Steve Bellovin. 9. Internet Sniffer Attacks E. Eugene Schultz and Thomas A. Longstaff. 10. Attack Class: Address Spoofing L. Todd Heberlein and Matt Bishop. 11. Passwords Peter J. Denning. 12. Location-Based Authentication: Grounding Cyberspace for Better Security Dorothy E. Denning and Peter F. MacDoran. 13. Tripwire: A Case Study in Integrity Monitoring Gene H. Kim and Eugene H. Spafford. 14. DIDS (Distributed Intrusion Detection System)- Motivation, Achitecture, and an Early Prototype Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, L. Todd Heberlein, Che-Lin Ho, Karl N. Levitt, Biswanath Mukherjee, Stephen E. Smaha, Tim Grance, Daniel M. Teal, and Doug Mansur. 15. Test Driving SATAN Ted Doty. 16. Java Security: Web Browsers and Beyond Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz. III. CRYPTOGRAPHY. 17. A Brief History of the Data Encryption Standard Walter Tuchman. 18. Wisecrackers Steven Levy. 19. Internet Privacy Enhanced Mail Stephen T. Kent. 20. Authentication for Distributed Systems Thomas Y.C. Woo and Simon S. Lam. 21. A Taxonomy for Key Recovery Encryption Systems Dorothy E. Denning and Dennis K. Branstad. IV. SECURE ELECTRONIC COMMERCE. 22. Electronic Commerce Peter J. Denning. 23. Atomicity in Electronic Commerce J. D. Tygar. 24. Securing the Commercial Internet Anish Bhimani. 25. Money in Electronic Commerce: Digital Cash, Electronic Fund Transfers, and Ecash Patiwat Panurach. 26. Identity-Related Misuse Peter G. Neumann. V. LAW, POLICY AND EDUCATION. 27. Law Enforcement in Cyberspace Address The Honorable Janet Reno, United States Attorney General. 28. Encryption Policy and Market Trends Dorothy E. Denning. 29. Remarks at Computers, Freedom and Privacy Conference IV Chicago Bruce Sterling. 30. Speech to High Technology Crime Investigation Association Lake Tahoe Bruce Sterling. 31. Are Computer Hacker Break-ins Ethical? Eugene H. Spafford. 32. Georgetown University Computer Systems Acceptable Use Policy. 33. University Administrative Policy Number 60 RESPONSIBLE OFFICE: Vice Provost for Information Technology and Services. 34. Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles Major Gregory White and Captain Gregory Nordstrom. Biographies. Index.

Reviews

Author Information

Peter J. Denning is vice provost for continuing professional education at George Mason University. Denning was president of the Association for Computing (ACM) and is now chair of the ACM Publications Board. His two most recent books are Computers Under Attack and Beyond Calculation: The Next 50 Years of Computing. Dorothy E. Denning is Professor of Computer Science at Georgetown University. She is the author of a classic book in the field, Cryptography and Data Security, a coeditor (with Peter J. Denning) of a more recent work, Internet Besieged: Countering Cyberspace Scofflaws, and the author of 100 papers on computer security. Dr. Denning has shared her special expertise on encryption in testimony before the U.S. Congress. 0201308207AB04062001

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List