Security Engineering: Difference between revisions

From
Jump to navigation Jump to search
Content deleted Content added
No edit summary
No edit summary
 
(2 intermediate revisions by one other user not shown)
Line 22: Line 22:
*[[Trusting Trust]]
*[[Trusting Trust]]
* [[Virtual Private Networks]] (not part of seminar, but on topic)
* [[Virtual Private Networks]] (not part of seminar, but on topic)
* [[Software Security]] (not part of seminar, but on topic)

Latest revision as of 14:39, 18 June 2005

Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]