Security Engineering: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
No edit summary
 
(2 intermediate revisions by one other user not shown)
Line 22: Line 22:
*[[Trusting Trust]]
*[[Trusting Trust]]
* [[Virtual Private Networks]] (not part of seminar, but on topic)
* [[Virtual Private Networks]] (not part of seminar, but on topic)
* [[Software Security]] (not part of seminar, but on topic)

Latest revision as of 14:39, 18 June 2005

Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]