Fifty years ago, in "1984, " George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this [...]
When "Practical Unix Security" was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the [...]
A landmark compilation of essays by security experts addresses the impact on today's common security problems of human-computer interaction, discussing the link between issues of software usability and network security problems, future cyber-security, the challenges confronting designers of security[...]