The Community for Technology Leaders
Green Image
Issue No. 04 - July-August (vol. 2)
ISSN: 1540-7993

Letters to the Editor (HTML)

pp. 7-8

Book Reviews (HTML)

pp. 10
Attacking Systems

Guest Editors' Introduction: Why Attacking Systems Is a Good Idea (HTML)

Iv?an Arce , Core Security Technologies
Gary McGraw , Cigital
pp. 17-19

The Appropriate Use of Force-on-Force Cyberexercises (Abstract)

Greg White , The University of Texas at San Antonio
Art Conklin , The University of Texas at San Antonio
pp. 33-37

Taking a Lesson from Stealthy Rootkits (Abstract)

Sandra Ring , The Sytex Group
Eric Cole , The Sytex Group
pp. 38-45
Malware Recon

The Spread of the Witty Worm (Abstract)

Colleen Shannon , Cooperative Association for Internet Data Analysis (CAIDA)
David Moore , Cooperative Association for Internet Data Analysis (CAIDA)
pp. 46-50
Biblio Tech

Deus Est Machina (Abstract)

pp. 51-53

Back to School (Abstract)

Deborah Frincke , Pacific Northwest National Laboratory
Matt Bishop , University of California, Davis
pp. 54-56
On the Horizon

Quantum Cryptography (Abstract)

Chip Elliott , BBN Technologies
pp. 57-61
Digital Rights

Bigger Share of a Smaller Pie (Abstract)

Michael Lesk , Rutgers University
pp. 62-64
Attack Trends

Approaching Zero (Abstract)

Elias Levy , Symantec
pp. 65-66
Secure Systems

Deploying and Using Public Key Technology: Lessons Learned in Real Life (Abstract)

Richard Guida , Johnson & Johnson
Robert Stahl , Johnson & Johnson
Thomas Bunt , Johnson & Johnson
Gary Secrest , Johnson & Johnson
Joseph Moorcones , Johnson & Johnson
pp. 67-71
The Honeynet Files

Honeypot Forensics Part I: Analyzing the Network (Abstract)

Frederic Raynal , MISC Magazine
Yann Berthier , Herv? Schauer Consultant
Philippe Biondi , Arche/Omnetica Group
Danielle Kaminsky , TEGAM International
pp. 72-78
Building Security In

Risk Analysis in Software Design (Abstract)

Denis Verdon , Fidelity National Financial
Gary McGraw , Cigital
pp. 79-84
Privacy Matters
Clear Text

Customers, Passwords, and Web Sites (Abstract)

Bruce Schneier , Counterpane Internet Security
pp. 88
88 ms
(Ver 3.1 (10032016))