Stopping computer crimes
- Denning, Peter J.
- Nov 28, 1989.
- Physical Description:
- 1 electronic document
- Restrictions on Access:
- Unclassified, Unlimited, Publicly available. and Free-to-read Unrestricted online access
- Two new books about intrusions and computer viruses remind us that attacks against our computers on networks are the actions of human beings. Cliff Stoll's book about the hacker who spent a year, beginning in Aug. 1986, attempting to use the Lawrence Berkeley Computer as a stepping-stone for access to military secrets is a spy thriller that illustrates the weaknesses of our password systems and the difficulties in compiling evidence against a hacker engaged in espionage. Pamela Kane's book about viruses that attack IBM PC's shows that viruses are the modern version of the old problem of a Trojan horse attack. It discusses the most famous viruses and their countermeasures, and it comes with a floppy disk of utility programs that will disinfect your PC and thwart future attack.
- NASA Technical Reports Server (NTRS) Collection.
- Document ID: 19920002439., Accession ID: 92N11657., RIACS-TR-89-47., NASA-CR-188896., and NAS 1.26:188896.
- No Copyright.
View MARC record | catkey: 15678593