"This sobering description of many computer-related failures throughout our world deflates the hype and hubris of the industry. Peter Neumann analyzes the failure modes, recommends sequences for prevention and ends his unique book with some broadening reflections on the future."
--Ralph Nader, Consumer AdvocateThis book is much more than a collection of computer mishaps; it is a serious, technically oriented book written by one of the world's leading experts on computer risks. The book summarizes many real events involving computer technologies and the people who depend on those technologies, with widely ranging causes and effects. It considers problems attributable to hardware, software, people, and natural causes. Examples include disasters (such as the Black Hawk helicopter and Iranian Airbus shootdowns, the Exxon Valdez, and various transportation accidents); malicious hacker attacks; outages of telephone systems and computer networks; financial losses; and many other strange happenstances (squirrels downing power grids, and April Fool's Day pranks).
Computer-Related Risks addresses problems involving reliability, safety, security, privacy, and human well-being. It includes analyses of why these cases happened and discussions of what might be done to avoid recurrences of similar events. It is readable by technologists as well as by people merely interested in the uses and limits of technology. It is must reading for anyone with even a remote involvement with computers and communications--which today means almost everyone.
Computer-Related Risks:
020155805XB04062001
Computer-Related Risks
The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced ...
This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats.
IT security needs are constantly evolving; this guide examines what history has taught us and predicts future concerns Points out the differences between artificial concerns and solutions and the very real threats to new technology, with ...
Some online businesses are inadvertently "sharing" data with others when they interoperate systems. This book examines the external threats to a company's system and explains how to react if your system and business goals diverge.
Robbie G. Trussell is the senior project manager of pharmacy systems for the Presbyterian Healthcare System based in Dallas, Texas. ... She serves as a clinical faculty practitioner for the University of Texas School of Pharmacy.
Computer Security Management
Security in Computing
Computer-Related Risks. ACM Press, New York, 1995. 2. Gary McGraw and Edward W. Felten. Java Security: Hostile Applets, Holes and Antidotes. John Wiley & Sons, New York, 1996. 3. Robert T. Morris. “A Weakness in the 4.2BSD UNIX TCP/IP ...
A team of internationally known IT security experts offers a helpful overview of the world of high-tech security and uses illustrative case studies to examine potential security risks, threats, and vulnerabilities, as well as ...