Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Mahan, Robert
Battelle Memorial Institute
Richland, Washington
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 54 reviews

   
  The executive guide to information security: threats, challenges, and solutions
Egan M., Mather T., Addison-Wesley Professional, 2004.  Type: Book (9780321304513)

Egan and Mather position this book as a crash course on information security for executives, and attempt to explain concepts in nontechnical terms and provide implementation advice for a fully functional information technology (IT) sec...

Jul 27 2005  
  Distinguishing between single and multi-source attacks using signal processing
Hussain A., Heidemann J., Papadopoulos C. Computer Networks 46(4): 479-503, 2004.  Type: Article

Improved methods for detecting denial of service (DOS) attacks, from single or multiple sources, are described in this paper. The subject is introduced by describing the problem, related published work, and attack taxonomies. A framewo...

Apr 13 2005  
  Cyber defense: art to science
Saydjari O. Communications of the ACM 47(3): 52-57, 2004.  Type: Article

This article argues for a strengthening of the scientific foundations of cyber defense. The author approaches the argument logically and vigorously, in five areas: the principal elements of cyber defense, the need for a dynamic rather ...

Sep 24 2004  
  Surviving security: how to integrate people, process, and technology (2nd ed.)
Andress A., Auerbach Publications, Boston, MA, 2003. 528 pp.  Type: Book (9780849320422)

At a first reading, this appears to be an extraordinary book, written at a moderate level of complexity, and targeted at the computer security practitioner. It is extremely well written, in a very readable conversational style, and cov...

Aug 18 2004  
   Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004) 407-411, 2004.  Type: Proceedings

This short paper addresses the critical issue of teaching computer security in college and university settings. It addresses the issue from the perspective of a very small college, with only six faculty members, and both an applied com...

May 19 2004  
  .NET security and cryptography
Thorsteinson P., Ganesh A., Prentice Hall Professional Technical Reference, Upper Saddle River, NJ, 2003. 496 pp.  Type: Book (9780131008519)

Guidance for implementing security and cryptography in the Microsoft .NET framework is provided in this book. It consists of four main parts, with a total of ten chapters and five appendices....

Apr 21 2004  
  Global software piracy revisited
Shin S., Gopal R., Sanders G., Whinston A. Communications of the ACM 47(1): 103-107, 2004.  Type: Article

Software piracy costs the industry $12 billion, in a $21.6 billion market (1999), according to the authors. They also report that common wisdom blames the disparity in global income level as the cause. The authors dispute this claim, c...

Feb 20 2004  
  Cryptanalysis of a pay-as-you-watch system
Joye M. Information Processing Letters 88(3): 119-120, 2003.  Type: Article

This short paper describes the vulnerability of the MICROCAST [1] micro-payment, pay-as-you-watch system that delivers multicast content. The system uses a modified form of the RSA algorithm that publishes more information than the tra...

Jan 21 2004  
  Public telephone network vulnerabilities
Lorenz G., Keller J., Manes G., Hale J., Shenoi S.  Database and application security (Proceedings of the fifteenth annual working conference, Niagara, Ontario, Canada, Jul 15-18, 2001) 151-164, 2002.  Type: Proceedings

The vulnerabilities of the public telephone network (PTN) backbone, private branch exchanges (PBXs), the Internet, cellular networks, and terminal access attachment technologies are described in this paper. It contains a motivating int...

Dec 30 2003  
  Security and privacy in user modeling
Schreck J., Kluwer Academic Publishers, Norwell, MA, 2003. 232 pp.  Type: Book (9781402011306)

Security and privacy in user modeling is about modeling user behavior in order to support user adaptive applications, especially as applied to the Web. The flow of the text follows the accepted model of determining requirements ...

Sep 30 2003  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy