> > >My newest book: > > "Protection and Security on the Information Superhighway" > > published by Wiley and Sons just hit the shelves. For a > > copy of the table of contents and ordering information, > > see http://all.net:8080 > > > My WWW client is broken at this moment can you email me a copy of table of > contents. I hope you can read html... <title> New Book </title> <h1> New Book <IMG SRC="../../mall/256color.gif" width=70 height=30 alt=""> </h1> <p> <i> Protection and Security on the Information Superhighway </i>, John Wiley and Sons, available March 1, 1995. (0-471-11389-1, 320 pages, $24.95) To order please visit your local bookstore or order directly from Wiley at 1-800-225-5945. Also available on the net from: <a href=http://www.clbooks.com> Computer Literacy</a>, <a href=http://www.technical.powells.portland.or.us> Powell's Technical Books</a>, <a href=http://www.softproeast.com/softpro> Softpro</a>, <a href=http://www.wordsworth.com> Wordsworths</a>, and <a href=http://www.readusa.com> Read USA</a>. <p> This book is about the risks of using the Information Superhighway and how people and companies can protect themselves from those risks. <p> The big differences between this book and other books on similar topics are: <ul> <li> - Broad coverage. <li> - High degree of accuracy. <li> - Detailed case studies. <li> - Importance to everyone living in or doing business in the United States. </ul> <p> Example: Many books only discuss threats to personal privacy from using the Internet. This book details threats to privacy, integrity, and service disruption for individuals, corporations, and government agencies, using all forms of information networking, including cable television systems, telephone networks, the Internet, and other networks, and tells you how to deal with those threats. <p> Example: Many books describe attacks in general terms. This book details specific incidents, why they happened, their impact, how they could have been prevented, and what you have to do to protect yourself from similar threats now and in the future. <p> Example: Many books describe how a high security gateway computer can be used to prevent direct entry in to corporate computers. This book describes how even the most secure systems can be penetrated, how management practices as well as technical operations must be combined to make protection effective, and how the Information Superhighway is impacting on individuals, small businesses, large corporations, and even the government itself. <p> Example: Many books, like the blind men touching an elephant, examine only a few parts of the issue. This book covers the big picture: policy, standards, procedures, documentation, auditing, technical safeguards, incident response, testing, physical security, personnel issues, legal considerations, awareness, training, education, and organizational structure. <p> Example: Many books talk in general terms about problems and solutions. This book provides detailed case studies of what specific organizations of many different sizes and types are doing, what their vulnerabilities are, and how they can start to address them. <p> Example: Many books talk about the Internet. This book goes beyond the Internet to discuss the future of cable systems, telephone systems, satellite communications, and all of the components of the Information Superhighway. <p> Example: Many books tell you about today's technology. This book looks into the future. With stunning accuracy, it tells you about the history of the Information Superhighway, the situation today, and how today's decisions are impacting your future. <p> Example: Many books describe a few personal experiences and a few widely published examples. This book contains over 250 references ranging from military information warfare examples in which entire countries have been brought to their knees to examples where individuals have brought major networks down by pressing only a few keys. <p> <H2>Contents</H2> <PRE> <B>Chapter 1</B>: Introduction and Overview <B>Chapter 2</B>: A Growing Dependency <B>Chapter 3</B>: The Disrupters Are Among Us <B>Chapter 4</B>: Asleep at the Switch <B>Chapter 5</B>: Protecting Your Information Assets <B>Chapter 6</B>: Protection Posture Case Studies <B>Chapter 7</B>: Summary and Conclusions <B>Appendix A</B>: Details of the NII <B>Appendix B</B>: Case Studies <B>References</B> <B>Glossary</B> <B>Index</B> </PRE>