ContributorsJim Appleyard, Security Consultant, Global IT Security Consulting, IBM Corporation, Charlotte, NC Steve Blanding, Arthur Andersen, Houston, TX Bill Boni, AMGEN, Thousand Oaks, CA James Cannady, Georgia Tech Research Institute, Atlanta, GA Scott Charney, Chief, Computer Crime Unit, Department of Justice, Washington, D.C. Stephen Cobb, Cobb Associates, Titusville, FL Michael J. Corby, M. Corby and Associates, Worcester, MA Steven P. Craig, Managing Partner, Venture Resources Management Systems, Lake Forest, CA Dorothy E. Denning, Professor and Chairperson, Computer Science, Georgetown University, Washington, D.C. Don Evans, UNISYS, Government Systems Group, Houston, TX Patricia A. P. Fisher, President, JANUS Associates Inc., Stamford, CT Edward H. Freeman, Attorney, West Hartford, CT Carl B. Jackson, Principal, Ernst and Young LLP, Houston, TX Stephen James, Senior Consultant, Price Waterhouse, Sydney, Australia Ray Kaplan, Senior Security Consultant, CyberSafe, Inc., Redmond, WA Gerald L. Kovacich, President, Information Security Management Associates, Mission Viejo, CA Joe Kovara, Product Development Manager, CyberSafe, Inc., Redmond, WA Micki Krause, Manager, Information Securities Systems, PacifiCare Health Systems, Cypress, CA Stanley Kurzban, Senior Instructor (retired), System Research Education Center, IBM Corporation, Chappaqua, NY Phillip Q. Maier, Program Manager, Secure Network Infrastructure Initiative, Lockheed Martin Corporation, Sunnyvale, CA Lynda L. McGhie, Manager, Information Security, Lockheed Martin Corporate, Bethesda, MD Stevan D. Mitchell, Trial Attorney, Computer Crime Unit, Department of Justice, Washington, D.C. William H. Murray, Executive Consultant, Information Systems Security, Deloitte and Touche, New Canaan, CT Will Ozier, President and Founder, Ozier, Peterse, and Associates, San Francisco, CA Donn B. Parker, Senior Management Consultant, SRI International, Menlo Park, CA Tom Parker, ICL Fellow, European Computer Manufacturers Association, United Kingdom Tom Peltier, Detroit Edison, Detroit, MI Donald R. Richards, Biometric Security Consultant, IriScan, Fairfax, VA Ravi S. Sandhu, Professor, George Mason University, Fairfax, VA E. Eugene Schultz, Program Manager, SRI Consultants, Menlo Park, CA Chris Sundt, Chief Consultant, ICL Enterprise Technology, United Kingdom Dan Thomsen, Secure Computing Corporation, Roseville, MN Peter S. Tippett, Director, Computer Ethics Institute, Pacific Palisades, CA Harold F. Tipton, Independent Consultant, Villa Park, CA Thomas Welch, Welch and Welch Investigations, Glenwood, NJ Glen Zorn, Senior Scientist, CyberSafe, Inc., Redmond, WA
|
We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.