|45.10||approx. 7-9 days|
Internet Besieged features interesting, alarming, original, and recently published writing about the vulnerability of the computer networks we use every day, and timely recommendations for strengthening network security. More than thirty chapters by leading figures in the field of security range from fairly technical explanations of encryption and detection systems to popular accounts of hacker attacks and the cyberpunk subculture. The book provides a history of awareness of Internet security risks while exploring the social, legal, political, and ethical implications of these security breaches and their suggested countermeasures.
I. THE WORLDWIDE NETWORK.1. The Internet After Thirty Years Peter J. Denning.
II. INTERNET SECURITY.7. An Evening with Berferd William Cheswick.
III. CRYPTOGRAPHY.17. A Brief History of the Data Encryption Standard Walter Tuchman.
IV. SECURE ELECTRONIC COMMERCE.22. Electronic Commerce Peter J. Denning.
V. LAW, POLICY AND EDUCATION.27. Law Enforcement in Cyberspace Address The Honorable Janet Reno, United States Attorney General.
Break-ins on the Internet! Assaults on privacy! Theft of information!
Break-ins, assaults, and thefts are prohibited. Yet they happen. How is this so? Just how clever are the invaders? What are the holes in supposedly secure systems? Internet Besieged explains the ingenious strategies employed by intruders. It shows how security experts must be both defensive and proactive to protect information, privacy, and electronic commerce.
Internet Besieged consists of over thirty original and recently published chapters written by leading figures in security. They range from technical explanations of encryption and intrusion-detection systems to popular accounts of hacker attacks.
Internet Besieged is organized for the general reader as well as the practicing professional. It covers:
For software developers, system managers and engineers, students, and concerned citizens, this book provides a broad awareness of Internet security risk while exploring the social, legal, political, and ethical implications of security breaches and suggested countermeasures.
Contributors include: Steve Bellovin, Matt Bishop, Bill Cheswick, Jim Christy, Stephen T. Kent, Steven Levy, Teresa Lunt, Peter G. Neumann, E. Eugene Schultz, Eugene H. Spafford, and Bruce Sterling.
Peter J. Denning is vice provost for continuing professional education at George Mason University. Denning was president of the Association for Computing (ACM) and is now chair of the ACM Publications Board. His two most recent books are Computers Under Attack and Beyond Calculation: The Next 50 Years of Computing.
Dorothy E. Denning is Professor of Computer Science at Georgetown University. She is the author of a classic book in the field, Cryptography and Data Security, a coeditor (with Peter J. Denning) of a more recent work, Internet Besieged: Countering Cyberspace Scofflaws, and the author of 100 papers on computer security. Dr. Denning has shared her special expertise on encryption in testimony before the U.S. Congress.