home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
cud2
/
cud218c.txt
< prev
next >
Wrap
Text File
|
1992-09-26
|
5KB
|
118 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 2, Issue #2.18 (December 28, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
PERIPATETIC GADFLY: Brendan Kehoe
USENET readers can currently receive CuD as alt.society.cu-digest.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission.
It is assumed that non-personal mail to the moderators may be reprinted
unless otherwise specified. Readers are encouraged to submit reasoned
articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
------------------------------
Date: Thu, 6 Dec 90 15:00:32 PST
From: Peter Denning <pjd@riacs.edu>
Subject: Computers Under Attack
********************************************************************
*** CuD #2.18: File 3 of 5: Computers Under Attack ***
********************************************************************
COMPUTERS UNDER ATTACK
Intruders, Worms, and Viruses
Edited by Peter J. Denning
ACM Press and Addison-Wesley, 1990, 554pp
$18.50 ACM members, $20.50 others
On behalf of ACM Press and the authors of the 38 articles brought together
in this edition, I am proud to announce that our book on the subject of
attacks on computers is now available.
This subject continues to receive ongoing attention in the national press
--for example, the recent discovery of $12M of toll fraud at the NASA
Johnson Space Center, Operation Sun Devil, an Esquire article about
computer pirates breaking in to the Bell System, and the recent splashy
appearance of the NRC report, "Computers at Risk".
The purpose of this book is to tell the story of attacks on computers in
the words of those who are making the story and who see the broad
perspective in which it is taking place. We have painstakingly selected
the articles and have provided connective material to bring out the global
context and show that the problem is not purely technology, not purely
people, but a product of the interaction between people and computers in a
growing worldwide network.
After and introduction and preface by me, the articles are arranged in six
parts. Most of these have been previously published, but there are a few
new pieces specifically commissioned for this volume.
PART I: THE WORLDWIDE NETWORK OF COMPUTERS
Worldnet and ARPANET by Denning, overview of networks by Quarterman,
reflections by Thompson, survey of computer insecurities by Witten.
PART II: INTRUDERS
Reflections by Reid, Wily hacker story by Stoll, a followup commentary by
Mandel, and a business perspective by Wilkes.
PART III: WORMS
Internet worm overview by Denning, perspectives on the Morris worm by MIT's
Rochlis et al, Purdue's Spafford, and Utah's Seeley, executive summary of
Cornell Report, Morris indictment and trial summary by Montz, original worm
paper by Shoch and Hupp.
PART IV: VIRUSES
Virus overview by Denning, BRAIN and other virus operation by Highland,
virus primer by Spafford et al, viral protection in MS/DOS by Brothers, and
a perspective on viruses by Cohen.
PART V: COUNTERCULTURES
Computer property rights by Stallman, cyberspace literature by Paul Saffo,
a dialog on hacking and security by Dorothy Denning and Frank Drake.
PART VI: SOCIAL, LEGAL, AND ETHICAL IMPLICATIONS
A spectrum of commentaries: moral clarity and sending a signal by Denning,
global city by Morris, virus bills in congress by Crawford, GAO report
summary, legal issues by Samuelson and by Gemingani, computer emergency
response by Scherlis et al, ethics statements by various organizations, ACM
President's letters by Kocher, ACM forum letters, law and order for the PC
by Director, RISKS perspectives by Neumann, crimoids by Parker.
To order the book, run to your local bookstore or call ACM Press Order
Department. For credit card orders only call 800-342-6626 or in
Maryland and outside the continental US call 301-528-4261 and for mail
orders ACM Order Department, P. O. Box 64145, Baltimore, MD 21264. The
price for ACM members is $18.50 and for nonmembers $20.50. Shipping is
extra unless you send a check to the order department. BE SURE TO INCLUDE
YOUR ACM MEMBER NUMBER AND THE BOOK ORDER NUMBER (706900).
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+