Geometry.Net - the online learning center
Home  - Book_Author - Schwartau Winn

e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 88    Back | 1  | 2  | 3  | 4  | 5  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Schwartau Winn:     more books (19)
  1. Information Warfare: Second Edition by Winn Schwartau, 1996-11-01
  2. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau, 2001-03-30
  3. Time Based Security by Winn Schwartau, 1999-02-01
  4. Information Warfare by Winn Schwartau, 2010-09-07
  5. Pearl Harbor Dot Com by Winn Schwartau, 2002-01-01
  6. Complete Internet Business Toolkit by Winn Schwartau, Chris Goggans, 1996-06
  7. Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.) by Winn Schwartau, 2001-04-01
  8. Terminal Compromise: Computer Terrorism in a Networked Society by Winn Schwartau, 1991-06
  9. Winn Schwartau - Terminal Compromise by Winn Schwartau, 2009-07-12
  10. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists by Winn Schwartau, 2000-01-01
  11. Low cost computer security.: An article from: Security Management by Winn Schwartau, 1994-06-01
  12. Cybershock by Winn Schwartau, 2000-01-01
  13. Pearl Harbor Dot Com by Winn Schwartau, 2002
  14. A Shitload of Practical Uses for the Most Flexible Word in the English Language: by Winn Schwartau, 2005-10-01

61. Www.attrition.org/~jericho/works/security/book_review.time_based_security
0672313413.RVW 990305 Time Based Security , Winn Schwartau, 1998, 0672-31341-3,U$49.99/C$70.95/UK 46.95 %A Schwartau, Winn %C n/a %D 1999 %E n/a %G 0-9628700
http://www.attrition.org/~jericho/works/security/book_review.time_based_security

62. Security Scene Errata
Author Winn Schwartau provides the latest security tips and insights, as wellas news from Network World Fusion (http//www.nwfusion.com), the most
http://www.attrition.org/errata/www/winn.003.html
Network World Fusion Focus: Security Following is your Network World Fusion Focus on Security for December 29, 1998. Author Winn Schwartau provides the latest security tips and insights, as well as news from Network World Fusion (http://www.nwfusion.com), the most comprehensive networking information service on the Internet. In today's NWFusion Focus on Security: 1) Today's Focus: Floppy security - Part I 2) Related links 3) About the author 4) Newsletter and subscription info [snip...] [I don't know about you, but I pesonally don't want my employees 3: playing games, 4: doing personal projects, 5: bringing computer viruses, or 6: stealing proprietary data. Of course, Mr. Schwartau thinks otherwise since he says "Obviously all of the answers would be yes." Security expert?] [snip...]

63. Photo Downloads
computer. Winn Schwartau 1 (upper body)(131k); Winn Schwartau 2 (headshot)(21k); Winn Schwartau 3 (full shot with Background)(1039k);
http://www.nicekids.net/press/photos/
The following photos are available for download. 1. For pc users, right click and "save target as" to your computer.
2. click on the link, and then after it loads "save the picture as", or copy it to your computer.

64. Author
Winn Schwartau Author. Winn Schwartau Author of Internet Computer Ethics forKids . Other Writings by Winn Schwartau. Books Pearl Harbor Dot Com (2001).
http://www.nicekids.net/about/staff/
Winn Schwartau
Author Winn Schwartau
Author of "Internet & Computer Ethics for Kids" A leading author in the field of information security, Winn Schwartau has authored and contributed to more than a dozen books on the topic. As one of the world's foremost authorities on Internet security, information warfare and infrastructure protection, Schwartau has testified before Congress, advised foreign governments, consulted with domestic governmental agencies including the U.S. Army, U.S. Air Force, FBI, NASA and NATO, and served as an expert witness on numerous issues ranging from cyberwar to electronic privacy.
Schwartau is president of Interpact, Inc . a consulting firm that develops innovative and entertaining information security awareness programs to educate and achieve higher levels of security in organizations, corporations, governments and schools. Schwartau is also the founder of Infowar.com and the US/EU InfoWarCom conferences. He maintains a hectic writing schedule and international lecturing circuit.
Schwartau's latest endeavor is a book titled The father of two Internet-savvy children, Schwartau began thinking about the concept of this book back in 1992 when he found his daughter hacking passwords at Office Depot stores. The final decision to put all current projects on hold and write this book came when he discovered his youngest son hacking into the neighbor's computer. It was right then and there that he decided that the need for children, parents and teachers to understand the ethical issues surrounding computers could wait no longer. "Kids have more power at their fingertips today than an entire nation did only two generations ago," says Schwartau. "We've got to get to the children. It's time to make cyber ethics for kids a national educational priority."

65. Availability.com, Your Business Continuity Resource: Layers - Security
08/2001, How to Break Into a Network with Only Three Keystrokes Winn Schwartau.08/2001, The Worm Turns Howard Millman. Part 2 Winn Schwartau.
http://www.availability.com/elements/information_technology/security.cfm?mode=ex

66. DisLEXia - Pearl Harbor Dot Com, By Winn Schwartau (2002-03-25)
Monday, 25. March 2002. Pearl Harbor Dot Com, by Winn Schwartau. PearlHarbor Dot Com A novel by Winn Schwartau Interpact Press Seminole
http://md.hudora.de/blog/guids/61/53/620020325003615906.html
Monday, 25. March 2002
Pearl Harbor Dot Com, by Winn Schwartau
Pearl Harbor Dot Com A novel by Winn Schwartau Interpact Press Seminole, Florida, 1-727-393-6600 2002 ISBN 0-9628700-6-4 512 pages We do not normally review or analyze RISKS-relevant fiction, but this book seems to make a rather compelling novel out of a surprisingly large number of security and reliability risk threats that we have discussed here over the years. The story echoes one of the fundamental problems confronting Cassandra-like risks-avoidance protagonists and agonists alike, namely, that, because we have not yet had the electronic Pearl Harbor, people in power perceive that there is little need to fix the infrastructural problems, so why bother to listen to the doom-sayers who hype up the risks? Well, in this novel, one man's massive craving for vengeance reaches major proportions, and significant effects result on critical infrastructures. In the end, the good hackers contribute notably to the outcome. The book is somewhere within the genre of technothrillers, with a typical mix of murder, mayhem, intrigue, computer-communication surveillance, and non-explicit s*x. I enjoyed it. It is entertaining, and the convoluted plot is quite consistent, fairly tight, and to RISKS readers, each incident is technologically quite plausible because many of the attacks seem almost reminiscent of past RISKS cases, sometimes just scaled up a little.

67. English Books > Computer > Internet - Security
Hackers, Phreakers, Identity Thieves, Internet Terrorists And Weapons Of MassDisruption Schwartau, Winn Paperback ISBN 156025307X Cybershock Surviving
http://book.netstoreusa.com/index/bkbco640.shtml

English Books

German Books

Spanish Books

Sheet Music
... Computer Index of 69 Titles
First page
Prev Next Last page ... Authentication Systems For Secure Networks Oppliger, Rolf Hardback; Book; ; ISBN: 0890065101
First page
Prev Next Last page
Delivery costs included if your total order exceeds US$50.
We do not charge your credit card until we ship your order.
Government and corporate Purchase Orders accepted without prior account application. PLACE AN ORDER
To prepare to buy this item click "add to cart" above. You can change or abandon your shopping cart at any time before checkout. CHECK ORDER STATUS Check on order progress and dispatch. CHANGE OR CANCEL YOUR ORDER Please E-mail us within one hour The NetStoreUSA website is operated by Open Communications, Inc an Arizona corporation, which has successfully served the Internet community since 1994. Site Design by GillespieFox ( www.gillespiefox.com ®Open Communications is a Registered Trade Mark. This material may be freely distributed ONLY with full reference to Open Communications Inc including fax, phone, e-mail, and world-wide web details.

68. Interpact Security Awareness And Information Security Services
Founded by Winn Schwartau, one of the leading Information Security professionalsin the United States, Interpact offers a range of information security
http://www.misti.com/01/interiw02lg01.html

69. ETEXT.TEXTFILES.COM: MODERN
Joly (1990). tc_read.me, 13867, Terminal Comprimise by Winn Schwartau The World's First NovelOn-The-Net Shareware . termc10.txt, 1359114,
http://www.textfiles.com/etext/MODERN/
MODERN
Text
Size
Description

2600-9-3.txt

Transcription of 2600 Magazine Autumn, 1992 agrippa.txt
Text of Agrippa (A Book of the Dead) by William Gibson (1992) approach.txt
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers and Keyboard Criminals by Paul Mungo and Bryan Glough (1993) bigd10.txt
Project Gutenberg: The Big Dummy's Guide to the Internet, by the EFF boh-10f8.txt
The Hacker Bible, by the Chaos Computer Club clinton1.txt
Project Gutenberg: President Clinton's Inaugural Address clinton2.txt
Project Gutenberg: President Clinton's Inaugural Address clinton3.txt Project Gutenberg: President Clinton's Inaugural Address ejournal21.txt Directory of Electronic Journals and Newsletters Edition 2.1 by Michael Strangelove (July, 1992) eyeargon.txt ASCII Transcription of the Eye of Argon, reputedly the Worst Science Fiction Novel Ever Written hack11a.txt The Project Gutenberg Extext of Bruce Sterling's Hacker Crackdown hckr_hnd.txt The Hacker's Handbook, by Hugo Cornwall (1985) hhandbook.txt

70. DEF CON III Archives
Winn Schwartau Information Warfare, the year in review. Winn Schwartau is one ofthe country's leading experts on information security and electronic privacy.
http://www.defcon.org/html/defcon-3/defcon-3.html
Last Updated 07.28.99
DEF CON III ARCHIVES
BEFORE DURING
  • Pictures from the convention Haxor Baby Hacker Jeopardy Friday night opening round.

  • Hear it! Real Audio (28k-isdn surestream)
  • Hacker Jeopardy Saturday night Final Round.

  • Hear it! Real Audio ( 28k-isdn surestream
  • Hacker Jeopardy Questions , those recovered at least. Speakers Saturday:
  • KEYNOTE
    Bruce Schneier
    Will speak on issues surrounding cryptography, digital authentication, digital cash, and will answer questions from the audience.
    Hear it! Real Audio ( 28k-isdn surestream Winn Schwartau Information Warfare, the year in review. Winn Schwartau is one of the country's leading experts on information security and electronic privacy. His recent non-fiction book, "Information Warfare: Chaos on the Electronic Superhighway (Thunder's Mouth Press, NY.) is a successful and compelling non technical analysis of personal privacy, economic and industrial espionage and national security. He calls for the creation of a National Information Policy, a Constitution in Cyberspace and an Electronic Bill of Rights. Mr. Schwartau is also the author of "Terminal Compromise", a fictionalized account of a computer terrorism based war waged on the United States. After selling well as a bookstore book, Terminal Compromise was placed on the Global Network as the world's first Novel-on-the-Net Shareware and has become an underground classic. This prophetic book predicted a number of cyber-events, including the Clipper Chip, chipping, magnetic assaults, hardware viruses, to name a few.

71. COSC 511 Schedule And Readings
Winn Schwartau, Ch. 2, Computers Everywhere and the Global Network, pp. 7186. 8-14.Winn Schwartau, Prologue to the Second Edition, pp. 16-22.
http://www.cs.georgetown.edu/~denning/cosc511/spring97/schedule.html
COSC 511 Schedule and Readings
January 13: Introduction to Information Warfare

72. [FW1] Off Topic - Time-based Security From Winn Schwartau
FW1 Off topic Time-based security from Winn Schwartau. I just started reading Time based security by Winn Schwartau. He has some interesting ideas.
http://www.shmoo.com/mail/fw1/dec98/msg00264.html
Date Prev Date Next Thread Prev Thread Next ... Thread Index
[FW1] Off topic - Time-based security from Winn Schwartau
hi yall, I know this is off topic, so forgive me. I just started reading "Time based security" by Winn Schwartau. He has some interesting ideas. Has anyone else read this book? Any comments? Thanx! /bm Get Your Private, Free Email at http://www.hotmail.com ================================================================================ To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html

73. Philosophy Of A Computer Hacker
Needham Heights, MA Allyn Bacon, 1999. 122123. Schwartau, Winn. The HappyHacker. http//www.happyhacker.org . Talkback Central Comments. Lewke.
http://www.llp.armstrong.edu/thomas/p3.html
Philosophy of a Computer Hacker
Marion Thomas

"A hacker is a guru, a computer geek" who is highly proficient in computers and uses his or her knowledge to gain unauthorized access to computer data. According to hacker Winn Schwartau, computer hacking "is a healthy form of educational recreation" which can provide a hacker with the advanced computer skills necessary to procure a high paying job. According to Schwartau, "Many network system administrators, computer scientists and computer security experts first learned their professions, not in some college program, but from the hacker culture." Is computer hacking a crime? Members in American society believe computer hacking is a crime because it invades our rights to privacy. Knowing that a hacker could gain access in to our private Emails, credit card information, or personal dossiers leaves us leery of the hacker's intentions and distrustful of the effectiveness of our computers security. The Mentor published "Hacker's Manifesto, or The Conscience of a Hacker," in the online hacker's Ejournal Phrack

74. Wired News: Teaching Kids About Hacking
ignorance is an excuse used by too many parents and teachers in their failure toteach kids cyberethics, computer security consultant Winn Schwartau says.
http://www.wired.com/news/culture/0,1284,42923,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Teaching Kids About Hacking
by Michelle Delio Also by this reporter Page 1 of 2 next
02:00 AM Apr. 14, 2001 PT Technical ignorance is an excuse used by too many parents and teachers in their failure to teach kids cyberethics, computer security consultant Winn Schwartau says. So Schwartau wrote a book, Internet and Computer Ethics for Kids, to educate both computer-savvy youngsters and technically challenged adults.
Story Tools
See also
Today's Top 5 Stories
Schwartau has been honored for his security work by heads of governments and the military in the United States and Europe, and has written or contributed to a dozen well-regarded books on computer and Internet security. But some educators and security consultants aren't thrilled with Internet and Computer Ethics for Kids.

75. Wired 4.08: Information Warrior
Winn Schwartau With the nation's wealth embedded in our electronicinfrastructure, we need to be ready to fight cyberwars.
http://www.wired.com/wired/archive/4.08/schwartau.html?topic=privacy&topic_set=n

76. Pathogen Security : News : New Book
Leading Security Advice New Winn Schwartau Book The only shockingelement to Winn Schwartau's newest book, Cybershock Surviving
http://www.pathogen.org.uk/news/winnbook.html
Leading Security Advice New Winn Schwartau Book The only shocking element to Winn Schwartau's newest book, Cybershock - Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption - is the depth of its irresponsibility. Its slick attempt to terrorize the reader about the dangers of the Internet and the fearsome, loathsome "hackers" who lurk within marks a new low.
The ninth paragraph of the first page sets the tone for the rest of this book. "I don't mean to scare you right off the bat here; there is plenty of time for that. But, if you are already part of the twenty-first century, which you are, you should be concerned at a minimum, and maybe, just maybe, very scared."
Of course Schwartau means to frighten - enough so that his book will probably make good bedtime reading for North Korea's Kim Jong Il or Pakistan's General Pervez Musharraf. They'll be sure to underline his caution to "Consider using psychological profiling of staff hopefuls to learn about their ethics, morals, tendencies, and proclivities . . ."
The proof is in the mail
"The hacking problem is big. No, make that huge," Schwartau proclaims, then adds the little caveat that "despite the studies, we really don't know exactly how huge. Is it $100 million or $100 billion? Does it matter?"

77. Works Cited
(25) Winn Schwartau, Citibank Hacker Awaiting Trial in New York, InfoWar,http//www.infowar.com/class_2/class2_092397a.htmlssi. Schwartau, Winn.
http://www.duke.edu/~kjw2/academic/banking/works.htm
History
Overview

Economics

Social Issues
...
Conclusion

Works Cited Works Cited Endnotes (1) Karen A. Forcht, "Privacy, Confidentiality, Security and Control Issues Relating to the Wide-Spread Use of the Information Highway," David D. Lattanze Center for Executive Studies in Information Systems at Loyola College, May 15, 1996, http://lattanze.loyola.edu/lattanze/research/wp0996.031.html (2) Alex Sheshunoff, "Electronic Banking: The Future is Now," Alex Sheshunoff Management Services Inc., Fall 1995, http://www.ashesh.com/domino/articlesbyalex.nsf/772e5725891ec32d862565440072da4a/c17f3b98fd80bff286256546007072fe?OpenDocument. (3) Andreas Crede, "Electronic Commerce and the Banking Industry: The Requirement and Opportunities for New Payment Systems Using the Internet," Journal of Computer-Mediated Communication , Volume 1, Number 3, December 1995, http://www.ascusc.org/jcmc/vol1/issue3/crede.html (4) Crede. (5) Crede. (6) Federal Deposit Insurance Corporation, "Electronic Banking: Safety and Soundness Examination Procedures," http://www.fdic.gov/publish/elecbank.pdf, p. 2. (7) FDIC 2-3. (8) FDIC 2.

78. Washingtonpost.com: Live Online
Leslie Walker's .com Live Discussion with Winn Schwartau, author of Cybershock 1 pm EDT Thursday, May 11, 2000, Winn Schwartau The networks are bigger.
http://discuss.washingtonpost.com/wp-srv/zforum/00/walker0511.htm

Home
Register Web Search:
Weekly Schedule
Video Archive Discussion Areas Politics Nation World Metro ...
Advertisers

Leslie Walker's .com Live

Discussion with Winn Schwartau, author of "Cybershock"
1 p.m. EDT: Thursday, May 11, 2000 Leslie Walker Welcome to DotCom Live. This week my guest is Internet security expert Winn Schwartau, author of the new book, "Cybershock." Schwartau's book takes readers into the world of hackers, hacking, identity theft, electronic snooping, espionage and cyber-terrorism. From the "ILoveYou" virus last week to the denial-of-service attack that recently crippled leading Web sites, information security has been much in the news. Schwartau, who also wrote "Information Warfare," will offer tips and answer questions on how to protect your family and computers from fraud, hacks, pornography and theft. Tune in at 1 P.M. Thursday or submit your questions early
Leslie Walker: Why don't you start by telling us what you see as the biggest cyberthreats facing society. Of all the scary scenarios, what should we be worried about the most? Winn Schwartau: The biggest threat is apathy, arrogance and ignorance. Some people flat out dont care about security or privacy. Others think "it will never happen to me, and everyone is blowing smoke to make money". Ignorance, though, is the worst. Not being aware of the real world capabilities, threats and vulnerabilities is something we have to desperately overcome. I (and others) told Congress about this as far back as 1991 and look how long it took them to anything like PPD-63 or the NIPC. They combined all three modes for failure.

79. New Page 1
27. Schwartau, Winn. Information Warfare Cyberterrorism Protecting Your PersonalSecurity in the Electronic Age, 2nd edition. 29. Schwartau, Winn.
http://www.lib.iup.edu/comscisec/Macf.htm
Mac Fiddner's Dissertation Bibliography The National Security Threat of the U.S. Information Infrastructure System and U.S. Information Infrastructure System Security Policy (Draft)
DISSERTATION BIBLIOGRAPHIES CHAPTER 1 – INTRODUCTION 1. Osgood, Robert E., and Robert W. Tucker. Force, Order, and Justice . Baltimore: The Johns Hopkins Press, 1967. 2. Millis, Water. An End to Arms . New York: Antheneum Press, 1964. 3. Campbell, Neil A. Biology . Redwood City, CA.: The Benjamin/Cummings Publishing Co., Inc., 1993. 4. Campbell, Donald T., and Julian C. Stanley. Experimental and Quasi-experimental Designs for Research Beyond Cold War Thinking: Security Threats and Opportunities (Report of the Twenty-Fifth United Nations of the Next Decade Conference sponsored by the Stanley Foundation), June 24-29, 1990, convened at The Lodge, Vail, Colorado. 6. Armed Forces Staff College. National Defense University. Formulation of National Strategy (Class 83). Volume 1: Student Guidance, Part 1. Norfolk, VA. January 1988.

80. Hacking
Cyberwars Espionage on the Internet; Guisnel, Jean / Schwartau, Winn PlenumPublishing; 10/1997; Softcover; $21.55 (20% off list); 295 pages;
http://kbbooks.hypermart.net/books/online_internet/hacking/hacking.htm
Hacking Subject Categories Online / Internet : Hacking Icon Legend = In Stock
= More info avail.
= We Recommend
= CD-ROM included
= Floppy included

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 4     61-80 of 88    Back | 1  | 2  | 3  | 4  | 5  | Next 20

free hit counter