Internet and Internetworking Security Author:James P. Cavanagh (editor) Contents: — Introduction by James P. Cavanagh — Part I — Taking the High View: Internet Security Philosophy — How Can You Lock an Open Door? by James P. Cavanagh — Protecting Proprietary Information by Jan Killmeyer — An Electronic Bill of Rights by Winn Schwartau — Planning for Internet Security by Monica J. Garfield and Patrick G. McKeown — Part... more » II
System Security
Authentication Processes by Roy Lee
Passwords: Strengths and Weaknesses by Gary C. Kessler
The Self-Hack Audit by Stephen James
Part III
Encyclopedia of Hacker Techniques
Exploiting Backdoors, Bugs, and Loopholes by Ron Hale
Inside Security Violators: Curiosity, Profit Motive, and Revenge by Jan Killmeyer
Password Hacking by Stephen James
Part IV
Viruses, Worms, and Trojan Horses
The Financial Impact of Computer Viruses
Evaluating Anti-Virus Solutions for Distributed Computing Environments by Scott Gordon
Part V
Encryption
Cryptography by Ralph Spencer Poore
Cryptography: Theory and Background by Charles Kaufman
Part VI
Legal and Regulatory Issues
Computer Security Infractions and Legal Action by Lawrence D. Dietz
The Threat to Internet Privacy and Access by Wayne Madsen
Key Escrow Encryption Policies and Technologies by Dorothy E. Denning and William E. Baugh, Jr.
Overview of Network Crime Case Law by Ethan Katsh
Part VII
Internetwork Security
Internet Security Overview by Katherine Hutchison
Internet vs. Intranet: Securing Corporate Internetworks by Michael Krenzin
How to Build, Install, and Verify a Firewall by Katherine Hutchison
Securing Electronic Commerce by William C. Curtiss
Successful Commerce on the Internet: The Key is Security Policy by Kermit Beseke
A New Security Model for Networks and the Internet by Dan Thomsen
The Security Risks of Using Java by Belden Menkus
Part VIII
Case Studies / War Stories
The Insider Threat, or, How I Stole $1 Billion by Ira Winkler
Breaking In: A Hacker's Confession by Stephen James