Extent:
1 online resource (2207 pages)
Type of publication: Book / Working Paper
Language: English
Notes:
Description based on publisher supplied metadata and other sources.
COMPUTER SECURITY HANDBOOK (Volume 1); CONTENTS; PREFACE; ACKNOWLEDGMENTS; ABOUT THE EDITORS; ABOUT THE CONTRIBUTORS; A NOTE TO THE INSTRUCTOR; INTRODUCTION TO PART I: FOUNDATIONS OF COMPUTER SECURITY; CHAPTER 1 BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY; 1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY; 1.2 EVOLUTION OF INFORMATION SYSTEMS; 1.2.1 1950s: Punched-Card Systems; 1.2.2 Large-Scale Computers; 1.2.3 Medium-Size Computers; 1.2.4 1960s: Small-Scale Computers; 1.2.5 Transistors and Core Memory; 1.2.6 Time Sharing; 1.2.7 Real-Time, Online Systems
1.2.8 A Family of Computers1.2.9 1970s: Microprocessors; 1.2.10 The First Personal Computers; 1.2.11 The First Network; 1.2.12 Further Security Considerations; 1.2.13 The First "Worm"; 1.2.14 1980s: Productivity Enhancements; 1.2.15 1980s: The Personal Computer; 1.2.16 Local Area Networks; 1.2.17 1990s: Interconnection; 1.2.18 1990s: Total Interconnection; 1.2.19 Telecommuting; 1.2.20 Internet and the World Wide Web; 1.2.21 Virtualization and the Cloud; 1.2.22 Supervisory Control and Data Acquisition; 1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE; 1.3.1 IA Standards
1.3.2 Computers at Risk1.3.3 InfraGard; 1.4 RECENT DEVELOPMENTS; 1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY; 1.6 NOTES; CHAPTER 2 HISTORY OF COMPUTER CRIME; 2.1 WHY STUDY HISTORICAL RECORDS?; 2.2 OVERVIEW; 2.3 1960S AND 1970S: SABOTAGE; 2.3.1 Direct Damage to Computer Centers; 2.3.2 1970-1972: Albert the Saboteur; 2.4 IMPERSONATION; 2.4.1 1970: Jerry Neal Schneider; 2.4.2 1980-2003: Kevin Mitnick; 2.4.3 Credit Card Fraud; 2.4.4 Identity Theft Rises; 2.5 PHONE PHREAKING; 2.5.1 2600 Hz; 2.5.2 1982-1991: Kevin Poulsen; 2.6 DATA DIDDLING; 2.6.1 Equity Funding Fraud (1964-1973)
2.6.2 1994: Vladimir Levin and the Citibank Heist2.7 SALAMI FRAUD; 2.8 LOGIC BOMBS; 2.9 EXTORTION; 2.10 TROJAN HORSES; 2.10.1 1988 Flu-Shot Hoax; 2.10.2 Scrambler, 12-Tricks, and PC Cyborg; 2.10.3 1994: Datacomp Hardware Trojan; 2.10.4 Keylogger Trojans; 2.10.5 Haephrati Trojan; 2.10.6 Hardware Trojans and Information Warfare; 2.11 NOTORIOUS WORMS AND VIRUSES; 2.11.1 1970-1990: Early Malware Outbreaks; 2.11.2 December 1987: Christmas Tree Worm; 2.11.3 November 2, 1988: Morris Worm; 2.11.4 Malware in the 1990s; 2.11.5 March 1999: Melissa; 2.11.6 May 2000: I Love You; 2.11.7 July 2010 Stuxnet
2.12 SPAM 22.12.1 1994: Green Card Lottery Spam; 2.12.2 Spam Goes Global; 2.13 DENIAL OF SERVICE; 2.13.1 1996: Unamailer; 2.13.2 2000: MafiaBoy; 2.14 HACKER UNDERGROUND; 2.14.1 1981: Chaos Computer Club; 2.14.2 1982: The 414s; 2.14.3 1984: Cult of the Dead Cow; 2.14.4 1984: 2600: The Hacker Quarterly; 2.14.5 1984: Legion of Doom; 2.14.6 1985: Phrack; 2.14.7 1989: Masters of Deception; 2.14.8 1990: Operation Sundevil; 2.14.9 1990: Steve Jackson Games; 2.14.10 1992: L0pht Heavy Industries; 2.14.11 2004: Shadowcrew; 2.14.12 Late 2000s: Russian Business Network (RBN); 2.14.13 Anonymous
2.14.14 2013: Unlimited Operations
ISBN: 978-1-118-85179-1 ; 978-1-118-12706-3 ; 978-1-118-12706-3
Source:
ECONIS - Online Catalogue of the ZBW
Persistent link: https://www.econbiz.de/10012684487