Matches in Harvard for { <http://id.lib.harvard.edu/aleph/007769082/catalog> ?p ?o. }
Showing items 1 to 31 of
31
with 100 items per page.
- catalog contributor b10746837.
- catalog contributor b10746838.
- catalog created "c1998.".
- catalog date "1998".
- catalog date "c1998.".
- catalog dateCopyrighted "c1998.".
- catalog description "DIDS (distributed intrusion detection system)-Motivation, architecture, and an early prototype / Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, L. Todd Heberlein, Che-Lin Ho, Karl N. Levitt, Biswanath Mukherjee, Stephen E. Smaha, Tim Grance, Daniel M. Teal, and Doug Mansur -- Test driving SATAN / Ted Coty -- Java security : Web browsers and beyond / Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz -- A brief history of the data encryption standard / Walter Tuchman -- Wisecrackers / Steven Levy -- Internet privacy enhances mail / Stephen T. Kent -- authentication for distributed systems / Thomas Y.C. Woo and Simon S. Lam -- A taxonomy for key recovery encryption systems / Dorothy E. Denning and Dennis K. Branstad --Electronic commerce / Peter J. Denning -- Atomicity in electronic commerce / J.D. Tygar -- Securing the commercial internet / Anish Bhimani.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Money in electronic commerce: digital cash, electronic fund transfers, and Ecash / Patiwat panuarch -- Identity-related misuse / Peter G. Neumann -- Law enforcement in Cyberspce address/ The HOnorable Janet Reno, United States Attorney General -- Encryption politcy and market trends / Dorothy E. Denning -- Remarks at Computers, Freedom and Privacy Conference IV Chicago / Bruce Sterling -- Speech to the High Tecnology Crime Investigation Association / Bruce Sterling, Lake Tahoe, November 1994 -- Are computer hacker break-ins ethical? / Eugene H. Spafford -- Georgetown University computer systems acceptable use policy -- University Administrative policy number 60 / Responsible office: Vice Provost for Information Technology and Services -- Security across the curriculum: using computer security to teach computer science principles/ Major Gregory White and Captain Gregory Nordstrom.".
- catalog description "The internet after thirty years / Peter J. Denning -- Cyberspace attacks and countermeasures / Dorothy E. Denning -- Rome laboratory attacks: prepared testimony of Jim Christy, Air Force Investigator, before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee / Jim Christy -- Reviewing the risks archives / Peter G. Neumann -- Securing the Information infrastructure / Teresa Lunt -- Computer viruses / Eugene H. Spafford -- an evening with Berferd / William Cheswick -- Network and internet security / Steve Bellovin -- Internet sniffer attacks / E. Eugene Schultz and Thomas A. Longstaff -- Attack class: address spoofing / L. Todd Heberlein and Matt Bishop -- Passwords / Peter J. Denning -- Location-based authentication: grounding cyberspace for better security / Dorothy E. Denning and Peter F. MacDoran -- Tripwire: a case study in integrity monitoring / Gene H. Kim and Eugene H. Spafford.".
- catalog extent "xii, 547 p. :".
- catalog hasFormat "Internet besieged.".
- catalog identifier "0201308207 (pbk. : alk. paper)".
- catalog isFormatOf "Internet besieged.".
- catalog issued "1998".
- catalog issued "c1998.".
- catalog language "eng".
- catalog publisher "New York, N.Y. : ACM Press ; Reading, Mass. : Addison Wesley,".
- catalog relation "Internet besieged.".
- catalog subject "364.16/8 21".
- catalog subject "Computer crimes.".
- catalog subject "Computer networks Security measures.".
- catalog subject "Computer security.".
- catalog subject "Electronic commerce.".
- catalog subject "HV6773 .I57 1998".
- catalog subject "Internet Security measures.".
- catalog tableOfContents "DIDS (distributed intrusion detection system)-Motivation, architecture, and an early prototype / Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, L. Todd Heberlein, Che-Lin Ho, Karl N. Levitt, Biswanath Mukherjee, Stephen E. Smaha, Tim Grance, Daniel M. Teal, and Doug Mansur -- Test driving SATAN / Ted Coty -- Java security : Web browsers and beyond / Drew Dean, Edward W. Felten, Dan S. Wallach, and Dirk Balfanz -- A brief history of the data encryption standard / Walter Tuchman -- Wisecrackers / Steven Levy -- Internet privacy enhances mail / Stephen T. Kent -- authentication for distributed systems / Thomas Y.C. Woo and Simon S. Lam -- A taxonomy for key recovery encryption systems / Dorothy E. Denning and Dennis K. Branstad --Electronic commerce / Peter J. Denning -- Atomicity in electronic commerce / J.D. Tygar -- Securing the commercial internet / Anish Bhimani.".
- catalog tableOfContents "Money in electronic commerce: digital cash, electronic fund transfers, and Ecash / Patiwat panuarch -- Identity-related misuse / Peter G. Neumann -- Law enforcement in Cyberspce address/ The HOnorable Janet Reno, United States Attorney General -- Encryption politcy and market trends / Dorothy E. Denning -- Remarks at Computers, Freedom and Privacy Conference IV Chicago / Bruce Sterling -- Speech to the High Tecnology Crime Investigation Association / Bruce Sterling, Lake Tahoe, November 1994 -- Are computer hacker break-ins ethical? / Eugene H. Spafford -- Georgetown University computer systems acceptable use policy -- University Administrative policy number 60 / Responsible office: Vice Provost for Information Technology and Services -- Security across the curriculum: using computer security to teach computer science principles/ Major Gregory White and Captain Gregory Nordstrom.".
- catalog tableOfContents "The internet after thirty years / Peter J. Denning -- Cyberspace attacks and countermeasures / Dorothy E. Denning -- Rome laboratory attacks: prepared testimony of Jim Christy, Air Force Investigator, before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee / Jim Christy -- Reviewing the risks archives / Peter G. Neumann -- Securing the Information infrastructure / Teresa Lunt -- Computer viruses / Eugene H. Spafford -- an evening with Berferd / William Cheswick -- Network and internet security / Steve Bellovin -- Internet sniffer attacks / E. Eugene Schultz and Thomas A. Longstaff -- Attack class: address spoofing / L. Todd Heberlein and Matt Bishop -- Passwords / Peter J. Denning -- Location-based authentication: grounding cyberspace for better security / Dorothy E. Denning and Peter F. MacDoran -- Tripwire: a case study in integrity monitoring / Gene H. Kim and Eugene H. Spafford.".
- catalog title "Internet besieged : countering cyberspace scofflaws / [edited by] Dorothy E. Denning, Peter J. Denning.".
- catalog type "text".