Experiences with consumer-oriented, high-speed Internet access technology.
As the wonders of global connectivity unfold, the world is changing its perception toward the use of computers. Computers are no longer viewed as mere number-crunching devices nor is the use of computers limited to the scientific …
An old adage holds true for software: you can build a stronger system by first breaking it.
Effective intrusion detection, like police work, requires prioritization and careful fusion of evidence from disparate sources.
Your mission-critical software has vulnerabilities that intruders will try to exploit. The U.S. Air Force is developing new systems to catch hackers as they search for weak points.
A distributed application is vulnerable to attack code masquerading as one of the components. An application that has been trained to recognize "itself" can reject such imposters.
Prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense.
A federation of spontaneously networked electronic components of all types can communicate, interact, and share their services and functions, as explained by Jini's lead architect.
Securing information with the world's smallest combination lock.
Sexual harassment via email may not only get you a stern rejection and cost you your job but leave an electronic trail of legal evidence that can be replayed and reread in a court of law.
What's to stop someonedesperate to fulfill a publishing quotafrom copying an article posted on a publicly available Web page,repackaging it under another byline, and resubmitting it to another journal?