Geometry.Net - the online learning center
Home  - Book_Author - Schwartau Winn

e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-88 of 88    Back | 1  | 2  | 3  | 4  | 5 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Schwartau Winn:     more books (19)
  1. Information Warfare: Second Edition by Winn Schwartau, 1996-11-01
  2. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau, 2001-03-30
  3. Time Based Security by Winn Schwartau, 1999-02-01
  4. Information Warfare by Winn Schwartau, 2010-09-07
  5. Pearl Harbor Dot Com by Winn Schwartau, 2002-01-01
  6. Complete Internet Business Toolkit by Winn Schwartau, Chris Goggans, 1996-06
  7. Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.) by Winn Schwartau, 2001-04-01
  8. Terminal Compromise: Computer Terrorism in a Networked Society by Winn Schwartau, 1991-06
  9. Winn Schwartau - Terminal Compromise by Winn Schwartau, 2009-07-12
  10. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists by Winn Schwartau, 2000-01-01
  11. Low cost computer security.: An article from: Security Management by Winn Schwartau, 1994-06-01
  12. Cybershock by Winn Schwartau, 2000-01-01
  13. Pearl Harbor Dot Com by Winn Schwartau, 2002
  14. A Shitload of Practical Uses for the Most Flexible Word in the English Language: by Winn Schwartau, 2005-10-01

81. CNN - Cyber-vigilantes Hunt Down Hackers - January 12, 1999
Cybervigilantes hunt down hackers. January 12, 1999 Web posted at1219 am EDT (1219 GMT). by Winn Schwartau. From (IDG) In
http://www.cnn.com/TECH/computing/9901/12/cybervigilantes.idg/

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Cyber-vigilantes hunt down hackers
January 12, 1999
Web posted at: 12:19 a.m. EDT (1219 GMT) by Winn Schwartau From...
(IDG) In September 1998, the Electronic Disturbance Theater, a group of activists that practices politically driven cyber civil-disobedience, launched an attack aimed at disabling a Pentagon Web site by flooding it with requests. The Pentagon responded by redirecting the requests to a Java applet programmed to issue a counteroffensive. The applet flooded the browsers used to launch the attack with graphics and messages, causing them to crash. The incident raises issues all user organizations will soon have to grapple with, if they haven't already. When you detect a break-in, should you launch a counterattack in order to protect your network? Is law enforcement capable of stopping cybercrime and can it be trusted to keep investigations quiet? If not, do corporations have a right to defend themselves?

82. 2002-01.html
Review Pearl Harbor Dot Com Winn Schwartau 512 pages, Thunders' MouthPress (2002) $10 paperback Richard Forno 8 January 2002 rforno
http://www.infowarrior.org/articles/2002-01.html
Review: Pearl Harbor Dot Com
Winn Schwartau 512 pages, Thunders' Mouth Press (2002) $10 paperback Richard Forno
8 January 2002
rforno@infowarrior.org
(c) 2002 by Author. Permission is granted to quote, reprint or redistribute provided the text is not altered, and appropriate credit is given. Summary: Review of Winn Schwartau's latest book on information warfare Winn Schwartau, controversial pundit, author, and speaker, is hitting the post-September 11th literary scene with a new book that he admits in his opening monologue is a more modernized and updated version of his 1991 limited-run technosecurity thriller "Terminal Compromise." Entitled " Pearl Harbor Dot Com ," Schwartau weaves another story about the end of the digital world in America, casting hack reporter "Tucker Macy Starre" as the longhaired, countercultured hero who is able to intermingle with 'hackers', law enforcement, and industry contacts. Those that know him will probably agree that "Starre" is Schwartau - both talk and write about information warfare, reportedly interact with hackers, and wear Daffy Duck neckties.....which is Schwartau's traditional conference attire (albiet with a business suit, not Starre's jeans and sportscoat, and he's not limited to Daffy Duck.) As expected, the story comes down to a novel about Electronic Good Versus Electronic Evil over the fate of the American Information Society. Replete with buzzwords and what-ifs ripped from the headlines of today's newspapers

83. Computer Hacking Pathfinder
HV6773 .M86 1992. Schwartau, Winn. CyberShock Surviving Hackers, Phreakers, IdentityThieves, Internet Terrorists, and Weapons of Mass Disruption. Call No.
http://www.rhodes.edu/library/pathfinders/hacking.html
Pathfinder: Computer Hacking
Library Home
Search Rhodes Catalog E-Books Other Libraries ... Rhodes Home Scope Hacker [Oxford English Dictionary, http://dictionary.oed.com/] a. A person with an enthusiasm for programming or using computers as an end in itself. colloq. (orig. U.S.
b. A person who uses his skill with computers to try to gain unauthorized access to computer files or networks. colloq General Print Sources
Davis, Charles N. Access Denied: Freedom of Information in the Information Age . Call No.: Greek, Cecil. Computers: the Internet and Criminal Justice . Call No.: Guisnel, Jean. CyberWars: Espionage on the Internet . Call No.: Hafner, Katie. Cyberpunk : Outlaws and Hackers on the Computer Frontier / Katie Hafner and John Markoff. Call No. : Hawke, Constance. .Call No.: Himanen, Pekka. Hacker Ethic: The Open-Source Movement and the Spirit of the New Economy. Call No.: Levy, Steven. Hackers: Heroes of the Computer Revolution . Call No.: Mann, Charles C.

84. Should You Counter-Attack When Network Attackers Strike?
1 Schwartau, Winn. CyberCivil Disobedience. 1/11/99. URL http//www.idg.net/go.cgi?id=45544.2 Schwartau, Winn. Can You Counter-Attack Hackers? 4/7/00.
http://www.sans.org/rr/infowar/counter-attack.php
-Select a Category- Top 25 Papers GIAC Honors Papers Acceptable Use Application/Db Sec Attacking Attackers Authentication Backup Strategies Best Practices Case Studies Commercial Software Country-specific Issues Covert Channels Digital Certificates Digital Privacy Directories Disaster Recovery DNS Issues eCommerce email Issues Firewalls Getting Started/InfoSec Hackers History of InfoSec Incident Handling Information Assurance Information Warfare Intrusion Detection Intrusion Prevention Legal Issues Linux Issues Logging Issues Mac/Apple Issues Main Frames Malicious Code Managed Services Network Devices Novell/Netware Issues Outsourcing Business PDAs Penetration Testing Physical Security Protocols Scripting Tips Securing Code Security Awareness Security Basics Security Modeling Security Policy Issues Social Engineering Solaris Issues Standards Steganography Switched Networks System Administration Telecommuting Telephone Issues Terminal Services Threats/Vulnerabilities Tools Travel Security Unix Issues VOIP Issues Web Servers Windows Issues Windows 2000 Issues Wireless Access Work Monitoring
Online Store
Reading Room Internet Storm Center GIAC Certification ... S.C.O.R.E.

85. NASA Computer Security Conference - Info
DAY ONE TUESDAY, MAY 14th, 1996 - 900 - KEYNOTE SPEAKER PLENARY - Winn SchwartauWinn Schwartau, one of the country's leading experts on information
http://www.netsys.com/fwtk/1996/04/msg00249.html
The Intelligent Hacker's Choice.. Systems, Networks, Administration.. since 1977 Enter phrases, or multiple key words.
Firewall Toolkit Users Mailing List Archives (home)
Latest News TZ=utc List All News SuSE-SA:2003:023 Security Announcement - sendmail
Windows QuickTime Player vulnerable

OpenSSH 3.6 released
... Thread Index
NASA Computer Security Conference - Info
http://aset.rsoc.rockwell.com

86. Bookmarks S, Scott's Internet Hotlist
Dr Robert; Crystal Cathedral Schuller, Dr. Robert; Crystal Cathedral SchwabNOW 2 SchwabNOW 3 SchwabNOW Schwartau's, Winn InfoWar.Com Schwartau's, Winn
http://www.geocities.com/mikelscott/s2.htm

87. Books.ontheweb: Winn
Name Internet and Computer Ethics for Kids (and Parents and Teachers Who Haven'tGot a Clue.) (Winn Schwartau) Price $15.95 More Like This More Info
http://books.ontheweb.com/shop/winn.html
OnTheWeb.com Network Sites OnTheWeb.com Fonts.OnTheWeb.com Images.OnTheWeb.com Shop.OnTheWeb.com Baby.OnTheWeb.com Books.OnTheWeb.com Cameras.OnTheWeb.com Dvds.OnTheWeb.com Electronics.OnTheWeb.com Garden.OnTheWeb.com Hardware.OnTheWeb.com Kitchen.OnTheWeb.com Magazines.OnTheWeb.com Music.OnTheWeb.com Office.OnTheWeb.com Software.OnTheWeb.com Tools.OnTheWeb.com Toys.OnTheWeb.com VideoGames.OnTheWeb.com Videos.OnTheWeb.com Coupons.OnTheWeb.com ReviewIndex.com CashGames.OnTheWeb.com FreeStuffSearch.com TotalFreeStuff.com Free.OnTheWeb.com YourName.OnTheWeb.com Top20Free.com Web Shop Fonts Images ... Book Home Search Results Book Categories:
Accessories
Arts and Photography Audio CDs Audiocassettes ... Travel Search The Web:
Book
Literature Fiction Bookstore ... Bestsellers Pop Web Searches:
Collectibles
Gifts Apparel Jewelry ... Mortgages Search Again:
Tea With Terrorists

Craig Winn
Only Taoist Secrets of Love
Mantak Chia
Only Book Search Results: winn (page 1) Name: Tea With Terrorists: Who They Are Why They Kill What Will Stop Them Craig Winn
Price:
[More Like This]
[More Info] [Buy This Book] Name: Because of Winn-Dixie Kate Dicamillo Price: [More Like This] [More Info] [Buy This Book] Name: Taoist Secrets of Love: Cultivating Male Sexual Energy Mantak Chia Price: [More Like This] [More Info] [Buy This Book] Name: Harbrace College Handbookw 1998 Mla Style Manual Updates (13th Ed) Winn Horner Price: [More Like This] [More Info] [Buy This Book] Name: The Manipulated Mind: Brainwashing Conditioning and Indoctrination Denise Winn Price: [More Like This] [More Info] [Buy This Book] Name: The Winn L. Rosch Hardware Bible (6th Edition)

88. The Risks Digest Volume 16: Issue 44
Jim Horning on Brian Randell Response to various comments on Internet SecurityWinn Schwartau Present Internet Security George Thornton Re Mexico election
http://catless.ncl.ac.uk/Risks/16.44.html
Forum on Risks to the Public in Computers and Related Systems
ACM Committee on Computers and Public Policy, Peter G. Neumann , moderator
Volume 16: Issue 44
Thus 29 September 1994
Contents
Re: Neural Redlining == Plausible Deniability ?
Jim Horning on Brian Randell
Response to various comments on Internet Security
Winn Schwartau ...
Info on RISKS (comp.risks)
Re: Neural Redlining == Plausible Deniability ? ( RISKS-16.40
Mon, 26 Sep 94 17:40:08 -0700 Brian Randell's posts to early volumes of RISKS about the St. George's medical school scandal are quite pertinent here. They are well worth re-reading in their entirety from the RISKS archives ( RISKS-4.27
Response to various comments on Internet Security ( RISKS-16.42
Thu, 29 Sep 94 11:53:25 -0500 [MODERATOR'S NOTE: I have omitted several of the flames that attacked Winn for the perceived high hype of his press-conference note in RISKS-16.42
Present Internet Security
Wed, 28 Sep 1994 12:15:25 GMT I noticed RISKS-16.42 contained the announcement for Internet security, and thus wish to append my own such annoucement. Not to upstage such a fine organization but such solutions to internet security already exist, have been announced, are shipping, and will be discussed in full at the Federal Smartcard Users Group at The Smartcard Forum. The "Present" of Internet is Secure! The Role of SmartCARDS in the Era of Network Security And NII A Shrink-Wrapped Solution Strategy Ray Hanner, V-ONE Corporation, Rockville Md Also Presenting Platform Issues of Smartcard Implementation Institutional Solution Strategy Avi Zahavi, ATT Smart Card Division, Highland Park, NJ On Sept. 27-28, Tyson Ritz Carlton Hotel, 1700 Tysons Blvd., Mclean, Virginia 703-506-4300 Voice 301-881-2297 Fax 301-881-5377 dgthornton@v-one.com

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 5     81-88 of 88    Back | 1  | 2  | 3  | 4  | 5 

free hit counter