Home Independent Dealers
For those who care about books!  
 Other Areas
Advanced Search
Browse Book Categories
Antiques Collectibles
Browse by Dealer
Author Autographs
Author Awards
Author Biographies
Author Pseudonyms
Collecting Information
Glossary of Terms
Helpful Sites
Publisher Information
Customer Account
Account Log-out
Contact Us
About TomFolio
For Bookdealers
Code of Ethics
Secure Shopping
Privacy Statement
Legal Information
Become a Member
Members Only

 Search Items
By Author:

By Title:

By Keywords:


Advanced Search
Items By Category: All Categories: Computers and Internet
5 items found.   List items by:   Author     Title     Publisher
1.   IEEE and various contributing authors
1984 Symposium on Security and Privacy, Proceedings, IEEE Computer Society
Publisher: IEEE Computer Society Calif. 1984, 227 pages, double-column text
Very Good overall, ex-university label at lower front cover, orange library hardcover binding, pages clean and sound

Includes Sections on Operating Sytems; Architectural Requirements; Database Systems; Cryptography; Security and verification with Ada; Verification; Networks and formal methods; special report; Work in Progress towards AI Systems; MORE

Papers include Attacks on computers - pending Congressional hearings; Comparison Paper Between the Bell and LaPadula Model and the SRI Model; MMS security model; Formal verification of a secure network with end-to-end encryption; Searching for public-key cryptosystems; Unwinding and inference control; Analysis of a Kernel verification; An augmented capability architecture to support lattice security and traceability of access; MORE mb1

Appr.: | AUD 13.51 CAD 13.33 EUR 9.43 GBP 7.91 JPY 1,000.00 MXN 166.67 ZAR 142.86 

Purchase direct from: Item number: R164.
Order From Dealer
2.   Landreth, Bill (aka 'The Cracker')
Out of the Inner Circle, the true story of a computer intruder capable of cracking the nation's most secure computer sys
Publisher: Tempus, Microsoft Corp., Redmond WA 1985, 1989; 230 pages, index
Very Good, oversized softcover white glossy decorated covers; slightly thumbed but binding is secure and sound, pages clean, unmarked

'the story of adeolescent ingenuity and intelligence mixed with high-stakes corporate and government intrigue.. Included are details of some of the more notorious capers of the Inner Circle -- how these intruders penetrated the nation's largest and most sensitive computer networks with nothing more than several hundred dollars' worthe of computer equipment, and how they were ultimately caught.. Also a valuable computer security handbook, which provides a security checklist of the loopholes exploited by computer intruders in the mini and mainframe computers and their operating systems..' (from the rear cover) Microcomputers and Security

Appr.: | AUD 4.05 CAD 4.00 EUR 2.83 GBP 2.37 JPY 300.00 MXN 50.00 ZAR 42.86 

Purchase direct from: Item number: M687.

Order From Dealer
3.   Levy, Steven
Crypto -- How the Code Rebels Beat the Government; Saving Privacy in the Digital Age
Publisher: Viking, NY, 2001, 356 pgs, Notes, Glossary, Bibliography, Index
Very Good or a bit better, hardcover, in Near Fine dustjacket & clear dustjacket protector; with black felt-tip remainder mark along bottom of textblock, otherwise pages are clean, binding is tight, flap of jacket unclipped. A nice copy of thisThe Loner; The Standard; Public Key; Prime Time; Selling Crypto; Patents & Keys; Crypto Anarchy; The Clipper Chip; Slouching Towrd Crypto; Epilogue- The Open Secret 'The first full-scale account of the great Code War that .. lucidly outlines the development of a 'people's' cryptography and its head-on collision with the US government. Crypto is about privacy in the information age and about the nerds and visionaries who, over 20 years ago, predicted that the Internet's greatest virtue -- free access to information -- was also its most perilous drawback -- a possible end to privacy..'(from the flap) Covers public key encryption & solution, anonymous digital money, cypherpunks like Whit Diffie, Paul zimmermann and David Chaum.. the human story of the breakthroughs..'

Appr.: | AUD 8.11 CAD 8.00 EUR 5.66 GBP 4.75 JPY 600.00 MXN 100.00 ZAR 85.71 

Purchase direct from: Item number: C06123.
Order From Dealer
4.   Schneier, Bruce
Applied Cryptography -- Protocols, Algorithms, and Source Code in C
Publisher: John Wiley & Sons NY 1994; 618 pages, Index, references, some illustrations
Very Good overall, glossy dark blue illustrated cardstock covers, thick softcover. Scuffs and some wear to covers. Binding is sound and secure, pages are clean and unmarked

'data security expert Bruce Schneier details how programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data..

how security can be built into the computer software and systems. Along with more than 100 pages of actual C source code of working cryptographic algorithms.

Explains data encryption protocols and techniques in use; from secure correspondence to anonymous messaging; numerous source code fragments and how to incorporate them into larger programs; related issues like patents, export law and legal rulings, much more

Appr.: | AUD 20.27 CAD 20.00 EUR 14.15 GBP 11.87 JPY 1,500.00 MXN 250.00 ZAR 214.29 

Purchase direct from: Item number: M551.
Order From Dealer
5.   Wang, Wallace
Steal This Computer Book -- what THEY won't tell you about the Internet
Publisher: No Starch Press, San Francisco CA 1998; 340 pages, index, some illustrations
Very Good overall, glossy large softcover, 'thumbprint' and 'fingerprint' illustrations on cover. Prev. owner's name rubberstamps along textblock fore-edge and endpages. Small corner tear lower rear cover. BInding is secure and tight, pages are clean and unmarked'No matter how secure your computer is, it is still vulnerable to a variety of attack that could steal your data, wreck your files, or even hoodwink you out of thousands of dollars..' (from the rear cover. 'Will inform, educate and maybe even shock you with the methods hackers use to crack the defenses of even the most secure computer..'Sections include -- Thinking Freely; Breaking Free; Fighting Back; Appendices - glossary; more'Just remember -- People who think for themselves can be more dangerous than all the weapons in the world.' (--from the introduction)

Appr.: | AUD 8.11 CAD 8.00 EUR 5.66 GBP 4.75 JPY 600.00 MXN 100.00 ZAR 85.71 

Purchase direct from: Item number: M490.
Order From Dealer

5 items found

Home   Contact Us   Bookdealers   Browse Books   Detailed Search   Antiques Collectibles   Privacy Statement   Shopping Cart

Copyright © 2000 - 2016 TomFolio is a registered
trademark of ABookCoOp, Inc. All rights reserved. Legal Information.