Read more
Klappentext Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy! firewalls! and security issues related to passwords. It addresses crime and misconduct on the Internet! considers the development of infrastructures that may prevent breaches of security and law! and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software! firewalls! and other network security equipment. Zusammenfassung Discusses the advancements in computer security policy, firewalls, and security issues related to passwords. This work addresses crime and misconduct on the Internet, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment. Inhaltsverzeichnis Development of Organization Internet Security Policy: An Hilisitc ApproachSharman LichtensteinSecurity for Future Computing EnvironmentsLynn Margaret BattenManaging Software Security Risks: Buffer Overflows and BeyondGary McGrawExperiments in Wireless Internet SecurityVipul Gupta and Sumit GuptaThe Neverending Saga of Internet Security: Why? How? And What to do Next?Eddie RabinovitchSecure Compartmented Data Access Over an Untrusted Network Using a Co-Based ArchitecturePaul C. Clark! Marion C. Meissner! and Karen O. VanceInternet SecurityMatt Bishop. Steven Cheung! Jeremy Frank! James Haogland! Steven Samorodin! and Chris WeeComputer Security: The Good! the Bad! and the UglyCatherine MeadowsArchitecture and Applications for a Distributed Embedded FirewallCharles Payne and Tom MarkhamUsing Operating System Wrappers to Increase the Resiliency of Commercial FirwallsJeremy Epstein! Linda Thomas! and Eric MonteithA Susceptible-Infected-Susceptible Model with Reintroduction for Computer Virus EpidemicsJohn C. WiermanMan vs. Machine-A Study of the Ability of Statistical Methodologies to Discern Human Generated ssh Traffic from Machine Generated scp TrafficJefrey L. Solka! Michelle L. Adams! and E.J. WegmanPassive Detection of Denial of Service Attacks on the InternetDavid J. MarchetteOn the Extiction of the S-I-S Stochastic Logistic EpidemicRichard J. Kryscio and Claude LefevreSecure Introduction of One-Way FunctionsDennis VolpanoPolicy-Based Authentication and Authorization Secure Access to the Network InfrastructureJeff HayesThe Evolution of Viruses and WormsThomas M. Chen and Jean-Marc RobertInfrastructure Web: Distributed Monitoring and Managing Critical InfrastructuresGuofei Jiang! Goerge Cybenko! and Dennis McGrathFirewalls: An Expert RoundtableA New Model for Probabilistic Information Retrieval on the WebGabriel Mateescu! Masha Sosonkina! and Paul Thompson ...