Proceedings of the Second Workshop on Real Large Distributed Systems
Author | : |
Publisher | : |
Total Pages | : 72 |
Release | : 2005 |
Genre | : Computer network architectures |
ISBN | : 9781931971409 |
Download Proceedings Of The Usenix Conference full books in PDF, epub, and Kindle. Read online free Proceedings Of The Usenix Conference ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!
Author | : |
Publisher | : |
Total Pages | : 72 |
Release | : 2005 |
Genre | : Computer network architectures |
ISBN | : 9781931971409 |
Author | : Mark C. Langston (Author) |
Publisher | : |
Total Pages | : 53 |
Release | : 2003 |
Genre | : Computer networks |
ISBN | : 9781931971164 |
Author | : Phil Lapsley |
Publisher | : Open Road + Grove/Atlantic |
Total Pages | : 432 |
Release | : 2013-02-05 |
Genre | : Business & Economics |
ISBN | : 0802193757 |
“A rollicking history of the telephone system and the hackers who exploited its flaws.” —Kirkus Reviews, starred review Before smartphones, back even before the Internet and personal computers, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary “harmonic telegraph,” by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same. Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T’s monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell’s Achilles’ heel. Phil Lapsley expertly weaves together the clandestine underground of “phone phreaks” who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI. The product of extensive original research, Exploding the Phone is a groundbreaking, captivating book that “does for the phone phreaks what Steven Levy’s Hackers did for computer pioneers” (Boing Boing). “An authoritative, jaunty and enjoyable account of their sometimes comical, sometimes impressive and sometimes disquieting misdeeds.” —The Wall Street Journal “Brilliantly researched.” —The Atlantic “A fantastically fun romp through the world of early phone hackers, who sought free long distance, and in the end helped launch the computer era.” —The Seattle Times
Author | : Patrick Traynor |
Publisher | : Springer Science & Business Media |
Total Pages | : 185 |
Release | : 2008-07-12 |
Genre | : Computers |
ISBN | : 0387724427 |
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.
Author | : Roger Dingledine |
Publisher | : Springer |
Total Pages | : 248 |
Release | : 2003-08-02 |
Genre | : Computers |
ISBN | : 3540364676 |
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Privacy Enhancing Technologies, PET 2002, held in San Francisco, CA, USA, in April 2002. The 17 revised full papers presented were carefully selected during two rounds of reviewing and improvement. Among the topics addressed are Internet security, private authentication, information theoretic anonymity, anonymity measuring, enterprise privacy practices, service architectures for privacy, intersection attacks, online trust negotiation, random data perturbation, Website fingerprinting, Web user privacy, TCP timestamps, private information retrieval, and unobservable Web surfing.
Author | : Javier López |
Publisher | : Springer Science & Business Media |
Total Pages | : 562 |
Release | : 2011-06 |
Genre | : Business & Economics |
ISBN | : 364221553X |
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
Author | : British Library. Document Supply Centre |
Publisher | : |
Total Pages | : 836 |
Release | : 2000 |
Genre | : Conference proceedings |
ISBN | : |