|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 54
reviews
|
|
|
|
|
|
|
|
The executive guide to information security: threats, challenges, and solutions Egan M., Mather T., Addison-Wesley Professional, 2004. Type: Book (9780321304513)
Egan and Mather position this book as a crash course on information security for executives, and attempt to explain concepts in nontechnical terms and provide implementation advice for a fully functional information technology (IT) sec...
|
Jul 27 2005 |
|
|
|
|
|
|
Distinguishing between single and multi-source attacks using signal processing Hussain A., Heidemann J., Papadopoulos C. Computer Networks 46(4): 479-503, 2004. Type: Article
Improved methods for detecting denial of service (DOS) attacks, from single or multiple sources, are described in this paper. The subject is introduced by describing the problem, related published work, and attack taxonomies. A framewo...
|
Apr 13 2005 |
|
|
|
|
|
|
Cyber defense: art to science Saydjari O. Communications of the ACM 47(3): 52-57, 2004. Type: Article
This article argues for a strengthening of the scientific foundations of cyber defense. The author approaches the argument logically and vigorously, in five areas: the principal elements of cyber defense, the need for a dynamic rather ...
|
Sep 24 2004 |
|
|
|
|
|
|
Surviving security: how to integrate people, process, and technology (2nd ed.) Andress A., Auerbach Publications, Boston, MA, 2003. 528 pp. Type: Book (9780849320422)
At a first reading, this appears to be an extraordinary book, written at a moderate level of complexity, and targeted at the computer security practitioner. It is extremely well written, in a very readable conversational style, and cov...
|
Aug 18 2004 |
|
|
|
|
|
|
Teaching computer security at a small college LeBlanc C., Stiller E. Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004) 407-411, 2004. Type: Proceedings
This short paper addresses the critical issue of teaching computer security in college and university settings. It addresses the issue from the perspective of a very small college, with only six faculty members, and both an applied com...
|
May 19 2004 |
|
|
|
|
|
|
.NET security and cryptography Thorsteinson P., Ganesh A., Prentice Hall Professional Technical Reference, Upper Saddle River, NJ, 2003. 496 pp. Type: Book (9780131008519)
Guidance for implementing security and cryptography in the Microsoft .NET framework is provided in this book. It consists of four main parts, with a total of ten chapters and five appendices....
|
Apr 21 2004 |
|
|
|
|
|
|
Global software piracy revisited Shin S., Gopal R., Sanders G., Whinston A. Communications of the ACM 47(1): 103-107, 2004. Type: Article
Software piracy costs the industry $12 billion, in a $21.6 billion market (1999), according to the authors. They also report that common wisdom blames the disparity in global income level as the cause. The authors dispute this claim, c...
|
Feb 20 2004 |
|
|
|
|
|
|
Cryptanalysis of a pay-as-you-watch system Joye M. Information Processing Letters 88(3): 119-120, 2003. Type: Article
This short paper describes the vulnerability of the MICROCAST [1] micro-payment, pay-as-you-watch system that delivers multicast content. The system uses a modified form of the RSA algorithm that publishes more information than the tra...
|
Jan 21 2004 |
|
|
|
|
|
|
Public telephone network vulnerabilities Lorenz G., Keller J., Manes G., Hale J., Shenoi S. Database and application security (Proceedings of the fifteenth annual working conference, Niagara, Ontario, Canada, Jul 15-18, 2001) 151-164, 2002. Type: Proceedings
The vulnerabilities of the public telephone network (PTN) backbone, private branch exchanges (PBXs), the Internet, cellular networks, and terminal access attachment technologies are described in this paper. It contains a motivating int...
|
Dec 30 2003 |
|
|
|
|
|
|
Security and privacy in user modeling Schreck J., Kluwer Academic Publishers, Norwell, MA, 2003. 232 pp. Type: Book (9781402011306)
Security and privacy in user modeling is about modeling user behavior in order to support user adaptive applications, especially as applied to the Web. The flow of the text follows the accepted model of determining requirements ...
|
Sep 30 2003 |
|
|
|
|
|
|
|
|
|
|
|