What people are saying - Write a review
We haven't found any reviews in the usual places.
The Information Society at Risk
ESSAY Turning Away an Attack with a Word
ESSAY Tests of Identity
4 other sections not shown
algorithm altered ANN R BOB ANN R W authorized user backup bank binary bits block BOB RW Bob's brute-force attack Bureau of Standards cables called characters cipher ciphertext communications computer crime computer data computer networks computer security computer systems computer's copy Data Encryption Standard decipher decrypt device digits dollars electrical electronic employees encoded Encryption Alternatives encryption system equipment example facility FILE ANN hackers identifying identity inside instructions intercepted intruder Julia Edwards logic bomb machine magnetic mantrap mathematical method million modem numbers one-time pad operating system Pair of Encryption password payroll file person personal computer phone phreak plaintext prime numbers private key protect public key public-key system puter read-access record reference monitor result secret key sender sensor signal signature storage stored SUBKEY tape techniques telephone template tion transmitted trap door Trojan horse unauthorized user's verify voltage vulnerable worm write-access