Item Successfully Added to Cart
An error was encountered while trying to add the item to the cart. Please try again.
OK
Please make all selections above before adding to cart
OK
The following link can be shared to navigate to this page. You can select the link to copy or click the 'Copy To Clipboard' button below.
Copy To Clipboard
Successfully Copied!
Network Threats
 
Edited by: Rebecca N. Wright AT&T Labs Research, Florham Park, NJ
Peter G. Neumann SRI International, Menlo Park, CA
A co-publication of the AMS and DIMACS
Front Cover for Network Threats
Available Formats:
Hardcover ISBN: 978-0-8218-0832-0
Product Code: DIMACS/38
List Price: $41.00
MAA Member Price: $36.90
AMS Member Price: $32.80
Electronic ISBN: 978-1-4704-3996-5
Product Code: DIMACS/38.E
List Price: $38.00
MAA Member Price: $34.20
AMS Member Price: $30.40
Bundle Print and Electronic Formats and Save!
This product is available for purchase as a bundle. Purchasing as a bundle enables you to save on the electronic version.
List Price: $61.50
MAA Member Price: $55.35
AMS Member Price: $49.20
Front Cover for Network Threats
Click above image for expanded view
  • Front Cover for Network Threats
  • Back Cover for Network Threats
Network Threats
Edited by: Rebecca N. Wright AT&T Labs Research, Florham Park, NJ
Peter G. Neumann SRI International, Menlo Park, CA
A co-publication of the AMS and DIMACS
Available Formats:
Hardcover ISBN:  978-0-8218-0832-0
Product Code:  DIMACS/38
List Price: $41.00
MAA Member Price: $36.90
AMS Member Price: $32.80
Electronic ISBN:  978-1-4704-3996-5
Product Code:  DIMACS/38.E
List Price: $38.00
MAA Member Price: $34.20
AMS Member Price: $30.40
Bundle Print and Electronic Formats and Save!
This product is available for purchase as a bundle. Purchasing as a bundle enables you to save on the electronic version.
List Price: $61.50
MAA Member Price: $55.35
AMS Member Price: $49.20
  • Book Details
     
     
    DIMACS - Series in Discrete Mathematics and Theoretical Computer Science
    Volume: 381998; 110 pp
    MSC: Primary 68; 94;



    This volume presents papers from a DIMACS workshop on network threats. The workshop brought together computer scientists (theorists and practitioners) working in this area to discuss topics such as network security, prevention and detection of security attacks, modeling threats, risk management, threats to individual privacy, and methods of security analysis. The book demonstrates the wide and diverse range of topics involved in electronic interactions and transactions—including the less desirable aspects: security breaches.

    The volume offers a timely assessment of avoiding or minimizing network threats. Presented here is an interdisciplinary, system-oriented approach that encompasses security requirements, specifications, protocols, and algorithms. The text includes implementation and development strategies using real-world applications that are reliable, fault-tolerant, and performance oriented. The book would be suitable for a graduate seminar on computer security.

    Features:

    • Discussion of Internet, Web and Java security
    • Information on new attacks and weaknesses
    • Formal and informal analysis methods to identify, quantify, and combat security threats

    Readership

    Graduate students, research mathematicians, computer scientists, and engineers interested in computer science.

  • Table of Contents
     
     
    • Chapters
    • A representation of protocol attacks for risk assessment
    • Verifying privacy enhanced mail functions with higher order logic
    • Cryptanalysis of RSA-type cryptosystems: A visit
    • Information leakage in encrypted key exchange
    • Observed weaknesses in security dynamics’ client/server protocol
    • Web security: A high level view
    • Flexible, extensible Java security using digital signature
    • Trust and security: A new look at the Byzantine generals problem
    • Channels: Avoiding unwanted electronic mail
    • Demonstration of hacker techniques
  • Request Review Copy
Volume: 381998; 110 pp
MSC: Primary 68; 94;



This volume presents papers from a DIMACS workshop on network threats. The workshop brought together computer scientists (theorists and practitioners) working in this area to discuss topics such as network security, prevention and detection of security attacks, modeling threats, risk management, threats to individual privacy, and methods of security analysis. The book demonstrates the wide and diverse range of topics involved in electronic interactions and transactions—including the less desirable aspects: security breaches.

The volume offers a timely assessment of avoiding or minimizing network threats. Presented here is an interdisciplinary, system-oriented approach that encompasses security requirements, specifications, protocols, and algorithms. The text includes implementation and development strategies using real-world applications that are reliable, fault-tolerant, and performance oriented. The book would be suitable for a graduate seminar on computer security.

Features:

  • Discussion of Internet, Web and Java security
  • Information on new attacks and weaknesses
  • Formal and informal analysis methods to identify, quantify, and combat security threats

Readership

Graduate students, research mathematicians, computer scientists, and engineers interested in computer science.

  • Chapters
  • A representation of protocol attacks for risk assessment
  • Verifying privacy enhanced mail functions with higher order logic
  • Cryptanalysis of RSA-type cryptosystems: A visit
  • Information leakage in encrypted key exchange
  • Observed weaknesses in security dynamics’ client/server protocol
  • Web security: A high level view
  • Flexible, extensible Java security using digital signature
  • Trust and security: A new look at the Byzantine generals problem
  • Channels: Avoiding unwanted electronic mail
  • Demonstration of hacker techniques
Please select which format for which you are requesting permissions.