Geometry.Net - the online learning center
Home  - Book_Author - Schwartau Winn
e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 101    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Schwartau Winn:     more books (19)
  1. Information Warfare: Second Edition by Winn Schwartau, 1996-11-01
  2. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau, 2001-03-30
  3. Time Based Security by Winn Schwartau, 1999-02-01
  4. Information Warfare by Winn Schwartau, 2010-09-07
  5. Pearl Harbor Dot Com by Winn Schwartau, 2002-01-01
  6. Complete Internet Business Toolkit by Winn Schwartau, Chris Goggans, 1996-06
  7. Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.) by Winn Schwartau, 2001-04-01
  8. Terminal Compromise: Computer Terrorism in a Networked Society by Winn Schwartau, 1991-06
  9. Winn Schwartau - Terminal Compromise by Winn Schwartau, 2009-07-12
  10. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists by Winn Schwartau, 2000-01-01
  11. Low cost computer security.: An article from: Security Management by Winn Schwartau, 1994-06-01
  12. Cybershock by Winn Schwartau, 2000-01-01
  13. Pearl Harbor Dot Com by Winn Schwartau, 2002
  14. A Shitload of Practical Uses for the Most Flexible Word in the English Language: by Winn Schwartau, 2005-10-01

61. [StatCompute] Re: [OSXForum] Winn Schwartau Switches To Mac OS X
Previous message StatCompute Winn Schwartau switches to Mac OS X; Messages sorted by date thread subject author
http://lists.stat.ucla.edu/pipermail/statcompute/2005-May/000777.html
[StatCompute] Re: [OSXForum] Winn Schwartau switches to Mac OS X
James Williamson jwjwj at ucla.edu
Tue May 31 08:57:52 PDT 2005 Hi, Speaking of security and switching, did anyone catch last Thursday's Wall Street Journal article wherein the new CEO if Intel (yes, that Intel) recommended using Apple over a Wintel solution. He cites much the same reason as Schwartau: the time spent cleaning off viri and malware: http://online.wsj.com/public/article/0,,SB111684809888140520- CB7pf4gh1ZaQ3oF44a0sjw8dJXY_20060524,00.html?mod=tff_main_tff_top "Pressed about security by Mr. Mossberg, Mr. Otellini had a startling confession: He spends an hour a weekend removing spyware from his daughter's computer. And when further pressed about whether a mainstream computer user in search of immediate safety from security woes ought to buy Apple Computer Inc.'s Macintosh instead of a Wintel PC, he said, "If you want to fix it tomorrow, maybe you should buy something else." Jim On May 28, 2005, at 11:27 AM, Jose L. Hales-Garcia wrote: > Security authority(1) switches to Mac OS X...

62. [StatCompute] Winn Schwartau Switches To Mac OS X
Next message StatCompute Re OSXForum Winn Schwartau switches to Mac OS X; Messages sorted by date thread subject author
http://lists.stat.ucla.edu/pipermail/statcompute/2005-May/000776.html
[StatCompute] Winn Schwartau switches to Mac OS X
Jose L. Hales-Garcia jose at stat.ucla.edu
Sat May 28 11:27:47 PDT 2005 Security authority(1) switches to Mac OS X... http://www.networkworld.com/columnists/2005/052305schwartau.html Jose (1) http://www.thesecurityawarenesscompany.com/chez/chez.php More information about the StatCompute mailing list

63. [ISN] REVIEW: "Time Based Security", Winn Schwartau (repost)
RVW 990305 Time Based Security , Winn Schwartau, 1998, 0672-31341-3, U$49.99/C$70.95/UK 46.95 %A Schwartau, Winn %C n/a %D 1999 %E n/a %G 0-9628700-4-8 %I
http://lists.virus.org/isn-9903/msg00017.html
Welcome to the Virus.Org Mailing List Archive
Date Prev
Date Next Thread Prev Thread Next ... Thread Index
[ISN] REVIEW: "Time based Security", Winn Schwartau (repost)
  • To Subject : [ISN] REVIEW: "Time based Security", Winn Schwartau (repost) From Date : Thu, 11 Mar 1999 17:31:11 -0600 (CST)
[moderator: sorry about that, hit send before finishing] 0672313413.RVW 990305 "Time Based Security", Winn Schwartau, 1998, 0-672-31341-3, U$49.99/C$70.95/UK#46.95 %A Schwartau, Winn %C n/a %D 1999 %E n/a %G 0-9628700-4-8 %I Interpact Press %O U$25.00/C$37.00 813.393.6600 http://www.infowar.com/tbs/

64. Philosophy Of A Computer Hacker
According to hacker Winn Schwartau, computer hacking is a healthy form of Schwartau, Winn. The Happy Hacker. http//www.happyhacker.org .
http://www.llp.armstrong.edu/reese/courses/4700/thomas/p3.html
Philosophy of a Computer Hacker
Marion Thomas

"A hacker is a guru, a computer geek" who is highly proficient in computers and uses his or her knowledge to gain unauthorized access to computer data. According to hacker Winn Schwartau, computer hacking "is a healthy form of educational recreation" which can provide a hacker with the advanced computer skills necessary to procure a high paying job. According to Schwartau, "Many network system administrators, computer scientists and computer security experts first learned their professions, not in some college program, but from the hacker culture." Is computer hacking a crime? Members in American society believe computer hacking is a crime because it invades our rights to privacy. Knowing that a hacker could gain access in to our private Emails, credit card information, or personal dossiers leaves us leery of the hacker's intentions and distrustful of the effectiveness of our computers security. The Mentor published "Hacker's Manifesto, or The Conscience of a Hacker," in the online hacker's Ejournal Phrack

65. Re: Nettime: Winn Schwartau On Infowar At Electronic Frontiers Forum
To cyberdawg@sig.net; Subject Re nettime Winn Schwartau on Infowar at Electronic Frontiers Forum; From Jon Lebkowsky jonl@onr.com ; Date Thu,
http://amsterdam.nettime.org/Lists-Archives/nettime-l-9702/msg00085.html
Jon Lebkowsky on Thu, 27 Feb 97 20:13 MET
Date Prev
Date Next Thread Prev Thread Next ... Thread Index Re: nettime: Winn Schwartau on Infowar at Electronic Frontiers Forum http://www.desk.nl/~nettime/ contact: nettime-owner@is.in-berlin.de

66. A Network Administrator Responds To Winn Schwartau's 'Mad As Hell' Declaration
Rich Rumble, a security administrator and network engineer for a large dotcom with over 3000 employees worldwide and more than 700 servers in use,
http://mac.zicos.com/news.php/n/210899/
sources Daily News Mac Bidouille Mac Daily News Mac Central ... Mac Critic
A Network Administrator Responds to Winn Schwartau's 'Mad as Hell' Declaration
TheMacObserver - Thursday July 21, 2005. 09:45 PM
Rich Rumble, a security administrator and network engineer for a large dot-com with over 3,000 employees worldwide and more than 700 servers in use, provides his thoughts on the problems facing Windows
Read more at TheMacObserver
www.macobserver.com/article/2005/07/21.14.shtml
Related News EA Responds To The Sims 2 Accusations InsideMacGames 07/29/05 05 PM 10.4: Minimize network traffic from Unit Converter widget MacOsxHints 07/29/05 02 PM Use local network image downloads in the screen saver MacOsxHints 07/29/05 02 PM Mac Daily News 07/27/05 05 PM News: MacWireless offers 3-port Powerline network adapter Mac Central 07/27/05 05 PM MacWireless offers 3-port Powerline Network Adapter MacNN 07/27/05 12 AM Systems Administrator Day Celebration at PC Weenies Mac Minute 07/20/05 02 PM Mac OS X 10.4.2 (#5): Sleep issues may be USB device, network... MacFixIt 07/18/05 05 PM Forbes: Apple to Become a Mobile Virtual Network Operator Power Page 07/18/05 02 PM Work For Spymac: Community Administrator Spymac 07/15/05 09 AM Mac OS X 10.4.2 (#3): More on delayed startup try disablin...

67. Category Browsing Results
Schwartau, Winn, 2000 Hacking for Evidence; Denial of Service Taking Down the Net; Schwartau to Congress - HERF This; Weapons of Mass Disruption;
http://opamp.com/cf/browse.cfm?Main=COMPUTERS&Sub1=SECURITY

68. Alisa Mike S World Of Books
Winn Schwartau leads readers through the basics (What s hacking? Who hacks?), introduces actual hacking tools and techniques, and using corporate,
http://alisaandmike.com/scybershock.html
Sort is by author's last name:
A
B C D ... Z
Sort by the first letter of the book title:
A
B C D ...
HOME

Book Description In recent years information warfare has trickled from the domain of governments and megacorporations into the lives and workplaces of the average citizen, and privacy concerns are at an all-time high. Cybershock is the first book to guide the average Internet user through online perils and offers answers and solutions in common-sense language. Winn Schwartau leads readers through the basics (What's hacking? Who hacks?), introduces actual hacking tools and techniques, and using corporate, law enforcement, and military examples, teaches how to become a successful anti-hacker. It also provides balanced viewpoints through graphic, pictorial, and written contributions from the principal stakeholders: hackers and phreakers; corporate security experts; lawyers and cyberjudicial professionals; and officers with the security-sensitive military and government agencies. The book includes an extensive listing of both hacking and anti-hacking Internet sites and a compendium of the leading anti-hacking security products and tools. Schwartau, Winn

69. Winn Schwartau 2
Winn Schwartau 2 Winn Schwartau 2.
http://mii.lps.org/archives/2002/photos2002/Pages/Image18.html

70. COSC 511 Schedule And Readings
Winn Schwartau, Prologue to the Second Edition, pp. 1622. Winn Schwartau, An Introduction to Information Warfare, pp. 27-42.
http://www.cs.georgetown.edu/~denning/cosc511/spring97/schedule.html
COSC 511 Schedule and Readings
January 13: Introduction to Information Warfare

71. COSC 511 Schedule And Readings
Winn Schwartau, Ch. 18, Outline of a National Information Policy Winn Schwartau, Ethical Conundra of Information Warfare, in Campen et al., pp.
http://www.cs.georgetown.edu/~denning/cosc511/spring98/schedule.html
COSC 511 Schedule and Readings
Note: For weeks where there is no class, the material will be discussed in the following class. The schedule is subject to additions and revisions.
January 12: Introduction to the Course
Introduction to course.
January 19: Introduction to Information Warfare (no class)
Elements of information warfare. Information warfare terms. Actors and acts. Losses. Trends in technology. Denning, Preface and Part I, all chapters. Alvin and Heidi Toffler, War and Anti-War: Survival at the Dawn of the 21st Century , Little, Brown and Company, 1993. Elin Whitney-Smith, War, Information and History: Changing Paradigms, in Campen et al., pp. 53-69. John Alger, Introduction to Information Warfare, 2nd. Edition, in Schwartau, pp. 8-14. Winn Schwartau, Prologue to the Second Edition, pp. 16-22; An Introduction to Information Warfare, pp. 27-42; Electronic Civil Defense, pp. 43-48; Ch. 2, Computers Everywhere and the Global Network, pp. 71-86. Charles Swett, Strategic Assessment: The Internet, http://www.fas.org/cp/swett.html.

72. MacIntosh Vs. Windows: Choosing To Take A Bite Of The Apple
Disgusted by security issues and poor performance, Winn Schwartau makes the switch from Winn Schwartau switches from Windows to Mac and tells why.
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1094430,00.html?O

73. Mad As Hell: I -- Switching To Mac
Winn Schwartau switches from Windows to Mac and tells why. Disgusted by security issues and poor performance, Winn Schwartau makes the switch from Windows
http://searchsecurity.techtarget.com/columnItem/0,294698,sid14_gci1094398,00.htm
Home News
Mad as Hell: I ...
EMAIL THIS PAGE TO A FRIEND News: Search for: in ALL NEWS ALL SEARCHSECURITY Full TargetSearch with Google COLUMN Mad as Hell: I Switching to Mac By Winn Schwartau
SOUND OFF! Post your comments Winn Schwartau switches from Windows to Mac and tells why. Disgusted by security issues and poor performance, Winn Schwartau makes the switch from Windows to the Mac and details the bumps in the road along the way in his " Mad as Hell " series. This is my first rant written on a Mac. Ever. Maybe I should have done it a long time ago, but I never said I was smart; just obstinate. Here's the deal. "I'm Mad! And I'm not going to take it anymore." Of course I am talking about the More Mad as Hell MacIntosh vs. Windows: Choosing to take a bite of the Apple
Disgusted by security issues and poor performance, Winn Schwartau makes the switch from Windows to the Mac and details the bumps in the road along the way in this exclusive intro to his "Mad as Hell" series. Mad as Hell archive Things used to work. And this is exactly why I am coming to subscribe to the view that indeed, the WinTel hegemony is a threat to the national economic security of any organization or nation-state that relies up it.

74. ETEXT.TEXTFILES.COM: MODERN
Terminal Comprimise by Winn Schwartau The World s First NovelOn-The-Net Shareware Project Gutenberg Terminal Compromise, by Winn Schwartau
http://www.textfiles.com/etext/MODERN/
MODERN
Text
Size
Description

2600-9-3.txt

Transcription of 2600 Magazine Autumn, 1992 agrippa.txt
Text of Agrippa (A Book of the Dead) by William Gibson (1992) approach.txt
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers and Keyboard Criminals by Paul Mungo and Bryan Glough (1993) bigd10.txt
Project Gutenberg: The Big Dummy's Guide to the Internet, by the EFF boh-10f8.txt
The Hacker Bible, by the Chaos Computer Club clinton1.txt
Project Gutenberg: President Clinton's Inaugural Address clinton2.txt
Project Gutenberg: President Clinton's Inaugural Address clinton3.txt Project Gutenberg: President Clinton's Inaugural Address ejournal21.txt Directory of Electronic Journals and Newsletters Edition 2.1 by Michael Strangelove (July, 1992) eyeargon.txt ASCII Transcription of the Eye of Argon, reputedly the Worst Science Fiction Novel Ever Written hack11a.txt The Project Gutenberg Extext of Bruce Sterling's Hacker Crackdown hckr_hnd.txt The Hacker's Handbook, by Hugo Cornwall (1985) hhandbook.txt

75. University Of Georgia: EITS: Information Security
Schwartau, Winn. TimeBased Security. Seminole, FL Interpact Press, 1999. Stevens, W. Richard. Winn Schwartau, 1999 Interpact Press ISBN 0-9628700-4-8
http://www.infosec.uga.edu/ciso/bookshelf.php
THE UNIVERSITY OF GEORGIA Office of the
Chief Information Security Officer [CISO] Text only version Key Services
Office of the Chief Information Security Officer
Contact Chief Information Security Officer
The University of Georgia
Athens, GA 30602
CISO Links InfoSec Links HIPAA Links
The CISO Bookshelf
General Information about Network Security
Abrams, Marshall D.; Podell, Harold J.; and Jajodia, Sushil.

76. InfoWarCon Brussels (fwd)
Breakout II Industrial Espionage An Update Moderator Winn Schwartau Phillipe Parant, Diecteur, DST, France (invited) Miguel Chamorro, Exec.
http://mailman.anu.edu.au/pipermail/link/1996-January/023379.html
InfoWarCon Brussels (fwd)
Roger Clarke Roger.Clarke@anu.edu.au
Thu, 18 Jan 1996 11:06:08 +1100 From 74774.1326@compuserve.com Thu Jan 18 00:19:44 1996 Date: 17 Jan 96 07:38:57 EST From: "(NCSA) Bob Bales" < 74774.1326@compuserve.com conference@ncsa.com To obtain the latest edition of this program, send EMail to: euroinfowar@ncsa.com For more information about NCSA: WWW: http://www.ncsa.com CompuServe: GO NCSA EMail: info@ncsa.com Sponsorships for various InfoWarCon (Europe) 96 events are still available. To find out how to sponsor portions: Contact Paul Gates at the NCSA: pgates@ncsa.com To reach: Winn Schwartau: Winn@Infowar.Com Robert Steele: ceo@oss.net V 1.3/1.15.96 - End Included Message - Roger Clarke http://www.anu.edu.au/people/Roger.Clarke/ Xamax Consultancy Pty Ltd, 78 Sidaway St, Chapman ACT 2611 AUSTRALIA Tel: +61 6 288 6916 Fax: +61 6 288 1472 Visiting Fellow, Faculty of Email: Roger.Clarke@anu.edu.au

77. Don’t Techno For An Answer The False Promise Of Information Warfare
Schwartau, Winn. Information Warfare Chaos on the Information Superhighway. Barbarians at the Gate Schwartau and Shukman. Winn Schwartau sounds an
http://www.iwar.org.uk/iwar/resources/nwc-review/false-promise-of-iw.htm
The False Promise of Information Warfare Brent Stuart Goodwin Adams, James. The Next World War: Computers Are the Weapon and the Frontline Is Everywhere . New York: Simon and Schuster, 1998. 288pp. $25 Arquilla, John, and David Ronfeldt, eds. . Santa Monica, Calif.: RAND, 1997. 501pp. $20 Schwartau, Winn. Information Warfare: Chaos on the Information Superhighway Shukman, David. . New York: Harcourt Brace, 1996. 272pp. $26 T HE U.S. VICTORY IN THE 1991 Persian Gulf War prompted widespread speculation about the future of warfare and the role of technology and information in the conduct of war. This has produced an ever-growing body of literature concerning the future of war and the implications toward U.S. policy. Unfortunately, that literature has gone from explanation to prediction with very little analysis in between. The predictions that have been made need to be studied in light of some of the major works in strategic studies. On the whole, one finds ruminations about information warfare lacking in useful hypotheses toward generating theoretical frameworks for strategic thinking about future events.

78. Precedence Bulk Subject Risks Digest 21.07 RISKS-LIST Risks
Subject REVIEW CyberShock , Winn Schwartau BKCBRSHK.RVW 20000625 CyberShock , Winn Schwartau, 2000, 156025-246-4, U$24.95 %A Winn Schwartau
http://public.planetmirror.com/pub/risks/risks-21.07
and by anonymous ftp at ftp.sri.com, cd risks . Contents: California DMV fosters identity theft? (PGN) Single points of failure and backup plans (William P.N. Smith) Control of Olympics news coverage (NewsScan) Tighter security poses a security threat (Ray Randolph) Cochise County election computer errors (Nicky L. Sizemore) The risk of identity theft (Amrith Kumar) De Fault is in Default (Charlie Shub) Re: AI strikes again (Perry Bowker, Zygo Blaxell) REVIEW: "CyberShock", Winn Schwartau (Rob Slade) Abridged info on RISKS (comp.risks) Date: Mon, 25 Sep 2000 14:08:03 PDT From: "Peter G. Neumann" Subject: California DMV fosters identity theft? An AP item (seen by me on the front page of the *Palo Alto Daily News*, 25 Sep 2000) says that the California Department of Motor Vehicles issued over 100,000 fraudulent drivers' licenses in 1999, and typically makes little or no effort to check the validity of the 900,000 duplicate license requests it receives each year. Examples include duplicate licenses issued to people of the wrong race or the wrong gender, and in one case bogus duplicates of a particular individual's license to 18 different people. The driver's license is called a ``breeding document'' for identity thieves, leading to financial fraud, ruined credit, purchases of firearms by felons, and other misuses. DMV officials claim that implementing an on-line photo-retrieval system would cost $3 million over the next two years. This seems like a useful system especially if it were used pervasively. Date: Mon, 25 Sep 2000 17:00:37 -0400 From: "William P.N. Smith"

79. Security Scene Errata
Winn Schwartau was called Chicken Little several years ago, when he said the United It s a title Tampa Bay s Winn Schwartau does not wear lightly.
http://attrition.org/errata/www/winn.006.html
['gang' implies (by Webster's Dictionary) a group intent on ILLEGAL activity, yet Cult of the Dead Cow does not partake in illegal activity.] [Hacker confidant? As I am one of the people he and his assistant go to for information on the hacker community, I can assure you this is an exaggeration.] [Find when they were formed.. x years vs x hacks = x/day] Along with hacking, consulting and organizing conferences on information warfare, Schwartau has built an impressive Web site (www.infowar.com). The site tracks computer security and hacker news, offers top-notch guests in its chat rooms and sells cutting-edge books on computer and international security. Schwartau's first love is writing. In addition to his more serious Information Warfare books, he is freshening the plot of an already published novel, Terminal Compromise, about a Japanese industrialist's online attack on the United States. He also co-authored in 1996 The Complete Internet Business Toolkit with security consultant Chris Goggans. Better known under his former hacker handle, "Erik Bloodaxe," Goggans was a founding member in the 1980s of the legendary hacker group Legion of Doom. [Quote phrack article showing he wasn't founder.]

80. Secretaria De Seguridad Publica
Winn Schwartau. 2000. ISBN 156025-246-4. Fisher Royal. *Schwartau, Winn, Cybershock, Ed. Thunder s Mouth Press, New York, 2000.
http://www.ssp.gob.mx/application?pageid=pcibernetica_sub_2&docName=BibliografÃ

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 4     61-80 of 101    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20

free hit counter