Computer-Related Risks

Computer-Related Risks
ISBN-10
0321703162
ISBN-13
9780321703163
Category
Computers
Pages
384
Language
English
Published
1994-10-18
Publisher
Addison-Wesley Professional
Author
Peter G. Neumann

Description

"This sobering description of many computer-related failures throughout our world deflates the hype and hubris of the industry. Peter Neumann analyzes the failure modes, recommends sequences for prevention and ends his unique book with some broadening reflections on the future." —Ralph Nader, Consumer Advocate This book is much more than a collection of computer mishaps; it is a serious, technically oriented book written by one of the world's leading experts on computer risks. The book summarizes many real events involving computer technologies and the people who depend on those technologies, with widely ranging causes and effects. It considers problems attributable to hardware, software, people, and natural causes. Examples include disasters (such as the Black Hawk helicopter and Iranian Airbus shootdowns, the Exxon Valdez, and various transportation accidents); malicious hacker attacks; outages of telephone systems and computer networks; financial losses; and many other strange happenstances (squirrels downing power grids, and April Fool's Day pranks). Computer-Related Risks addresses problems involving reliability, safety, security, privacy, and human well-being. It includes analyses of why these cases happened and discussions of what might be done to avoid recurrences of similar events. It is readable by technologists as well as by people merely interested in the uses and limits of technology. It is must reading for anyone with even a remote involvement with computers and communications—which today means almost everyone. Computer-Related Risks: Presents comprehensive coverage of many different types of risks Provides an essential system-oriented perspective Shows how technology can affect your life—whether you like it or not!

Other editions

Similar books

  • Computer-Related Risks
    By Neumann

    Computer-Related Risks

  • Computer Security Threats
    By Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés

    This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats.

  • Computers at Risk: Safe Computing in the Information Age
    By Mathematics, National Research Council, Division on Engineering and Physical Sciences

    The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced ...

  • Security 2020: Reduce Security Risks This Decade
    By Doug Howard, Kevin Prince

    IT security needs are constantly evolving; this guide examines what history has taught us and predicts future concerns Points out the differences between artificial concerns and solutions and the very real threats to new technology, with ...

  • For the Record: Protecting Electronic Health Information
    By Mathematics, National Research Council, Division on Engineering and Physical Sciences

    Robbie G. Trussell is the senior project manager of pharmacy systems for the Presbyterian Healthcare System based in Dallas, Texas. ... She serves as a clinical faculty practitioner for the University of Texas School of Pharmacy.

  • Investigating Computer-Related Crime
    By Keith Gilbert, Peter Stephenson

    Computer-Related Risks. ACM Press, New York, 1995. 2. Gary McGraw and Edward W. Felten. Java Security: Hostile Applets, Holes and Antidotes. John Wiley & Sons, New York, 1996. 3. Robert T. Morris. “A Weakness in the 4.2BSD UNIX TCP/IP ...

  • Risk Management for Computer Security: Protecting Your Network and Information Assets
    By Andy Jones, Debi Ashenden

    Unfortunately, in the electronic environment, with the exception of the cases recorded by Peter G. Neumann in his book, Computer Related Risks,1 there is little or no documented information that is publicly available for incidents that ...

  • Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
    By Tim Mather, Subra Kumaraswamy, Shahed Latif

    Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world.

  • Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
    By Josephine Wolff

    In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early “Internet Security Liability” policies in the late 1990s to the expansive coverage offered today.

  • Detecting and Mitigating Robotic Cyber Security Risks
    By Pandey, Kumar, Prasant Kumar

    Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on ...