Skip to main content

Overview

Introduction
Living in a Cyber World
by Robert Keating

 

Section 1: The Hacker

1.1   The Hacker in your Hardware
        by John Villasenor

1.2   Hacking the Lights Out
        by David M. Nicol

1.3   The Attack of Code Red
        by Carolyn P. Meinel

1.4   Attack of the Worms
        by Michael Moyer

 

Section 2: Nowhere to Hide

2.1   The End of Privacy?
        by Daniel J. Solove

2.2   Stealing Secrets
        by W. Wayt Gibbs

2.3   Brave New World of Wiretapping
        by Whitfield Diffie and Susan Landau

2.4   Tag-- You’re It
        by Katherine Albrecht

2.5   Malware Goes Mobile
        by Mikko Hypponen

2.6   The Ultimate Database
        by Simson L. Garfinkel

 

Section 3: The Solutions

3.1   How to Keep Secrets Safe
        by Anna Lysyanskaya

3.2   Improving Online Security
        by John Rennie, et al.

3.3   Can Phishing Be Foiled?
        by Lorrie Faith Cranor

3.4   Beyond Fingerprinting            
        by Anil K. Jain and Sharath Pankanti