Re: A Variety of Things of Possible Interest

Dr. Frederick B. Cohen (fc@all.net)
Mon, 27 Mar 1995 06:08:01 -0500 (EST)

> 
> >My newest book:
> >        "Protection and Security on the Information Superhighway"
> >        published by Wiley and Sons just hit the shelves.  For a
> >        copy of the table of contents and ordering information,
> >        see http://all.net:8080
> >
> My WWW client is broken at this moment can you email me a copy of table of
> contents.

I hope you can read html...

<title> New Book </title>

<h1> New Book <IMG SRC="../../mall/256color.gif" width=70 height=30 alt=""> </h1>

<p> 
<i> Protection and Security on the Information Superhighway </i>, John
Wiley and Sons, available March 1, 1995.  (0-471-11389-1, 320 pages,
$24.95) To order please visit your local bookstore or order directly
from Wiley at 1-800-225-5945.  Also available on the net from: <a
href=http://www.clbooks.com> Computer Literacy</a>, <a
href=http://www.technical.powells.portland.or.us> Powell's Technical
Books</a>, <a href=http://www.softproeast.com/softpro> Softpro</a>, <a
href=http://www.wordsworth.com> Wordsworths</a>, and <a
href=http://www.readusa.com> Read USA</a>. 

<p>
        This book is about the risks of using the Information
Superhighway and how people and companies can protect themselves from
those risks.

<p>
        The big differences between this book and other books on similar
topics are:

<ul>
<li>        - Broad coverage.
<li>      - High degree of accuracy.
<li>       - Detailed case studies.
<li>        - Importance to everyone living in or doing business in the United States.

</ul>

<p>
        Example: Many books only discuss threats to personal privacy
from using the Internet.  This book details threats to privacy,
integrity, and service disruption for individuals, corporations, and
government agencies, using all forms of information networking,
including cable television systems, telephone networks, the Internet,
and other networks, and tells you how to deal with those threats.

<p>
        Example: Many books describe attacks in general terms.  This
book details specific incidents, why they happened, their impact, how
they could have been prevented, and what you have to do to protect
yourself from similar threats now and in the future.

<p>
        Example: Many books describe how a high security gateway
computer can be used to prevent direct entry in to corporate computers.
This book describes how even the most secure systems can be penetrated,
how management practices as well as technical operations must be
combined to make protection effective, and how the Information
Superhighway is impacting on individuals, small businesses, large
corporations, and even the government itself.

<p>
        Example: Many books, like the blind men touching an elephant,
examine only a few parts of the issue.  This book covers the big
picture: policy, standards, procedures, documentation, auditing,
technical safeguards, incident response, testing, physical security,
personnel issues, legal considerations, awareness, training, education,
and organizational structure.

<p>
        Example: Many books talk in general terms about problems and
solutions.  This book provides detailed case studies of what specific
organizations of many different sizes and types are doing, what their
vulnerabilities are, and how they can start to address them.

<p>
        Example: Many books talk about the Internet.  This book goes
beyond the Internet to discuss the future of cable systems, telephone
systems, satellite communications, and all of the components of the
Information Superhighway.

<p>
        Example: Many books tell you about today's technology.  This
book looks into the future.  With stunning accuracy, it tells you about
the history of the Information Superhighway, the situation today, and
how today's decisions are impacting your future.

<p>
        Example: Many books describe a few personal experiences and a
few widely published examples.  This book contains over 250 references
ranging from military information warfare examples in which entire
countries have been brought to their knees to examples where individuals
have brought major networks down by pressing only a few keys.

<p>


<H2>Contents</H2>
<PRE>
<B>Chapter 1</B>: Introduction and Overview
<B>Chapter 2</B>: A Growing Dependency
<B>Chapter 3</B>: The Disrupters Are Among Us
<B>Chapter 4</B>: Asleep at the Switch
<B>Chapter 5</B>: Protecting Your Information Assets
<B>Chapter 6</B>: Protection Posture Case Studies
<B>Chapter 7</B>: Summary and Conclusions
<B>Appendix A</B>: Details of the NII
<B>Appendix B</B>: Case Studies
<B>References</B>
<B>Glossary</B>
<B>Index</B>
</PRE>