Geometry.Net - the online learning center
Home  - Book_Author - Schwartau Winn

e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 88    Back | 1  | 2  | 3  | 4  | 5  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Schwartau Winn:     more books (19)
  1. Information Warfare: Second Edition by Winn Schwartau, 1996-11-01
  2. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau, 2001-03-30
  3. Time Based Security by Winn Schwartau, 1999-02-01
  4. Information Warfare by Winn Schwartau, 2010-09-07
  5. Pearl Harbor Dot Com by Winn Schwartau, 2002-01-01
  6. Complete Internet Business Toolkit by Winn Schwartau, Chris Goggans, 1996-06
  7. Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.) by Winn Schwartau, 2001-04-01
  8. Terminal Compromise: Computer Terrorism in a Networked Society by Winn Schwartau, 1991-06
  9. Winn Schwartau - Terminal Compromise by Winn Schwartau, 2009-07-12
  10. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists by Winn Schwartau, 2000-01-01
  11. Low cost computer security.: An article from: Security Management by Winn Schwartau, 1994-06-01
  12. Cybershock by Winn Schwartau, 2000-01-01
  13. Pearl Harbor Dot Com by Winn Schwartau, 2002
  14. A Shitload of Practical Uses for the Most Flexible Word in the English Language: by Winn Schwartau, 2005-10-01

41. Winn-schwartau Photo -- Declan Mccullagh Photograph
Winn Schwartau, after Defcon speech photographed on 2000.07 in Las Vegas,Nevada Nikon Coolpix 950 camera size is 48 KB volume 95012.
http://www.mccullagh.org/image/950-12/winn-schwartau.html
Winn Schwartau, after Defcon speech
photographed on 2000.07
in Las Vegas, Nevada
Nikon Coolpix 950 camera
size is 48 KB
volume
Other photos with this theme:
Here's information on buying a print of this photograph, obtaining a high-resolution image, and licensing 1ds: holocaust museum 1ds: washington monument 1ds: winter images ...
search
Enter your email address for a free subscription to Declan McCullagh's moderated technology and politics mailing list
Declan McCullagh
Contact McCullagh
for licensing conditions or high-resolution versions of any photo, image, or photograph.

42. Las Vegas, Nevada Location -- Declan McCullagh Photos
WinnSchwartau / Winn Schwartau, after Defcon speech. defcon-7 / Defcontrash. defcon-8 / Defcon black and white ball (near the end).
http://www.mccullagh.org/location/lasvegasnevada.html
HIGHLIGHTS 1ds: holocaust museum 1ds: washington monument 1ds: winter images cipa supreme court ... yosemite national park SEARCH PHOTO DESCRIPTIONS JOIN POLITECH MAILING LIST
defcon-1
/ Defcon rave (more or less) defcon-2 / Defcon Alexis Park hotel lobby defcon-3 / Line to get in to CDC presentation defcon-4 / Watching CDC presentation from afar the room was full defcon-5 / Hackers queue to be interviewed by clueless TV reporters defcon-6 / Priest and Karen at Defcon jim-mccoy-mojonation / Jim McCoy of Autonomous Zone Industries, which created the open-source MojoNation software, speaking at Defcon winn-schwartau / Winn Schwartau, after Defcon speech defcon-7 / Defcon trash defcon-8 / Defcon black and white ball (near the end) defcon-9 / Defcon black and white ball (near the end) defcon-10 / Defcon pool party defcon-11 / Defcon pool party defcon-12 / Defcon pool party defcon-13 / Smoke bomb afloat in Defcon hotel pool defcon-14 / Hotel security removing smoke bomb from hotel pool defcon-15 / Save Napster sign from Defcon conference room jon-lasser-kathleen-ellis / Jon Lasser and Kathleen Ellis, a happy couple at Defcon

43. Nettime: Winn Schwartau On Infowar At Electronic Frontiers Forum
nettime Winn Schwartau on Infowar at Electronic Frontiers Forum. Tocyberdawg@sig.net; Subject nettime Winn Schwartau on Infowar
http://amsterdam.nettime.org/Lists-Archives/nettime-l-9702/msg00079.html
Jon Lebkowsky on Mon, 24 Feb 97 18:06 MET
Date Prev
Date Next Thread Prev Thread Next ... Thread Index nettime: Winn Schwartau on Infowar at Electronic Frontiers Forum Thursday, 27 February 6 p.m. PST Winn Schwartau, in Electronic Frontiers javachat: http://www.talk.com telnet: talk.com information: http://www.talk.com/eff/ http://www.desk.nl/~nettime/ contact: nettime-owner@is.in-berlin.de

44. Re: Nettime: Winn Schwartau On Infowar At Electronic Frontiers Forum
Re nettime Winn Schwartau on Infowar at Electronic Frontiers Forum. Prev bythread nettime Winn Schwartau on Infowar at Electronic Frontiers Forum;
http://amsterdam.nettime.org/Lists-Archives/nettime-l-9702/msg00085.html
Jon Lebkowsky on Thu, 27 Feb 97 20:13 MET
Date Prev
Date Next Thread Prev Thread Next ... Thread Index Re: nettime: Winn Schwartau on Infowar at Electronic Frontiers Forum http://www.desk.nl/~nettime/ contact: nettime-owner@is.in-berlin.de

45. 2002 Fall SIW - Winn Schwartau, Special Speaker On Information Security
2002 Fall SIW Winn Schwartau, Special Speaker on Information Security.Article by Rick Sharp (res17@naic.wpafb.af.mil) As an acknowledged
http://www.sisostds.org/webletter/siso/iss_86/art_484.htm
2002 Fall SIW - Winn Schwartau, Special Speaker on Information Security Article by: Rick Sharp (res17@naic.wpafb.af.mil)
Mr. Schwartau is a popular and entertaining speaker and interactive seminar leader who always keeps his US, European and International audiences awake with thought provoking insights and commentary. He also runs CyberWar Games for Government and commercial clients providing valuable training in a highly interactive and thought provoking manner.
Winn will be conducting his CyberWar and SurfVivor games on Monday, 9 September as part of a tutorial. He will also be giving a presentation in the afternoon titled “Information Warfare, from the Inside Out”.
Close

46. Winn Schwartau’s Review
age, whilst at the same time increasing their chances of benefitingfrom the new opportunities produced. Winn Schwartau’s 2001.
http://www.cm.deakin.edu.au/mwarren/winn.htm
This excellent offering was designed to introduce business executives and managers to the concepts of information warfare from a non-military, organizational perspective. This book will help you develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. It covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. Managers or staff in the areas of information technology, security, knowledge management, public relations, or marketing should find the ideas in this book to be directly useful. Its main purpose is to make readers aware of the new world of information saturation; thus decreasing the chance that they will become victims of those abusing the information age, whilst at the same time increasing their chances of benefiting from the new opportunities produced. Winn Schwartau’s 2001

47. ISN 1999/03: [ISN] REVIEW: "Time Based Security", Win
ISN REVIEW Time based Security , Winn Schwartau (repost). From meaculpa (jericho@dimensional.com) Date Sun Mar 07 1999 231643 PST.
http://lists.jammed.com/ISN/1999/03/0018.html
[ISN] REVIEW: "Time based Security", Winn Schwartau (repost)
From: mea culpa ( jericho@dimensional.com
Date: Sun Mar 07 1999 - 23:16:43 PST
  • Next message: mea culpa: "[ISN] Phil-Sec: Call for Papers: CQRE" [moderator: sorry about that, hit send before finishing] 0672313413.RVW 990305 "Time Based Security", Winn Schwartau, 1998, 0-672-31341-3, U$49.99/C$70.95/UK#46.95 %A Schwartau, Winn %C n/a %D 1999 %E n/a %G 0-9628700-4-8 %I Interpact Press %O U$25.00/C$37.00 813.393.6600 http://www.infowar.com/tbs/ jericho@dimensional.com majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] This archive was generated by hypermail 2b30 Fri Apr 13 2001 - 13:20:24 PDT
  • 48. ISN 1999/03: (no Subject)
    0962870048.RVW 990214 Time Based Security , Winn Schwartau, 1998, 0672-31341-3,U$49.99/C$70.95/UK 46.95 %A Schwartau, Winn %C n/a %D 1999 %E n/a %G 0-9628700
    http://lists.jammed.com/ISN/1999/03/0017.html
    (no subject)
    From: mea culpa ( jericho@dimensional.com
    Date: Sun Mar 07 1999 - 22:09:26 PST
  • Next message: mea culpa: "[ISN] REVIEW: "Time based Security", Winn Schwartau (repost)" 0962870048.RVW 990214 "Time Based Security", Winn Schwartau, 1998, 0-672-31341-3, U$49.99/C$70.95/UK#46.95 %A Schwartau, Winn %C n/a %D 1999 %E n/a %G 0-9628700-4-8 %I Interpact Press %O U$25.00/C$37.00 813.393.6600 http://www.infowar.com/tbs/ jericho@dimensional.com majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com] This archive was generated by hypermail 2b30 Fri Apr 13 2001 - 13:20:23 PDT
  • 49. The Risks Digest Volume 19: Issue 54
    ICL Looks To Prisoners To Tackle Year 2000 Problem, Andrew Craig, TechWeb 8 Jan1998, PGN Stark Abstracting Winn Schwartau Winn@infowar.com V 813.393.6600
    http://catless.ncl.ac.uk/Risks/19.54.html
    Forum on Risks to the Public in Computers and Related Systems
    ACM Committee on Computers and Public Policy, Peter G. Neumann , moderator
    Volume 19: Issue 54
    Saturday 10 January 1998
    Contents
    China Imposes New Controls on Internet Access
    Edupage
    Risks of too-friendly browsers
    Russell Aminzade ...
    Info on RISKS (comp.risks)
    China Imposes New Controls on Internet Access
    Thu, 8 Jan 1998 13:15:53 -0500 New rules against "defaming government agencies," spreading pornography and violence, and revealing state secrets have been imposed by the Chinese government. The rules, which are said particularly to target Internet users, call for criminal punishment and fines of up to $1,800 for Internet providers and users who are found to have spread "harmful" information or leak state secrets via the Internet. In announcing the rules, China's assistant minister for public security noted that Internet links had increased China's cultural and scientific exchanges around the world, but that "the connection has also brought about some security problems, including manufacturing and publicizing harmful information, as well as leaking state secrets." (Chronicle of Higher Education 9 Jan 1998; (Edupage, 8 Jan 1998)
    Risks of too-friendly browsers
    Fri, 9 Jan 1998 08:22:02 -0500

    50. 'twURLed World' Thumbnail Information Warfare An Overview By
    Information Warfare An Overviewby Winn Schwartau http//www.interpactinc.com/IWseminar.html......Good URLs! twURLed World
    http://www.twurled-world.com/Infowar/Update3/URL_Details/URL_176.htm

    Domains
    Top 10 Keywords
    Decisions
    ... Topic: Information Warfare and U.S. Critical Infrastructure Protection
    URLs:
    previous next
    All
    Site ...
    Where am I?
    twURLed World Description: Information Warfare: An Overview by Winn Schwartau
    http://www.interpactinc.com/IWseminar.html
    Valuation 94: quintile (low-high) Decision: Keywords *infowar: computer crime crypto cryptography ... training Annotations Interpact's Information Security Awareness Programs and Information Security Services
    [excerpted by copernic] ServicesWinn SchwartauInfosecGateHomeSite MapContact INFORMATION WARFARE:From Security to Infrastructure Protection to the Military: An Overview of Security, ElectronicCivil Defense and the Networked SocietyBy Winn SchwartauEver since Assistant Secretary of Defense John lHamre in April 1998 and July, 1999 declared ""We Are At War", the media has stood up and notice...
    [excerpted by twURL] SOURCE Links:
  • COPERNIC Infowar.csv - -> DETAILS
  • HTML META
    keywords
    information security services, e-commerce, cybercrime, security awareness, training, hackers, hacking, information security consulting, infowar, information warfare, netspionage, infosec, Information Protection, information security portal, espionage, computer crime, crypto, cryptography
    description Interpact's Information Security Awareness Programs and Information Security Services
  • 51. Walmart.com - Cybershock Surviving Hackers, Phreakers, Identity
    Cybershock Surviving Hackers, Phreakers, Identity Thieves, Internet Terroristsand Weapons of Mass Disruption,Schwartau, Winn available at Walmart.com.
    http://www.walmart.com/catalog/product.gsp?product_id=923234&cat=20205&type=3&de

    52. Walmart.com - Security
    Schwartau, Winn. Hardcover, Thunder's Mouth Press, 2000, ISBN 1560252464. MoreInfo. Schwartau, Winn. Paperback, Thunder's Mouth Press, 2001, ISBN 156025307X.
    http://www.walmart.com/catalog/product_listing.gsp?cat=20205&path=0:3944:3951:18

    53. Project BookRead - FREE Online Book: "Terminal Compromise" By Winn Schwartau
    Terminal Compromise Winn Schwartau. Terminal Compromise Winn SchwartauWho thanks you for your consideration. INTER.PACT Press 11511 Pine St.
    http://tanaya.net/Books/termc10/
    "Terminal Compromise"
    Winn Schwartau "Terminal Compromise"
    Winn Schwartau
    Who thanks you for your consideration.
    INTER.PACT Press
    11511 Pine St.
    Seminole, FL 34642
    All contents are (C) 1991, 1992, 1993 Inter.Pact
    THE WORLD'S FIRST NOVEL-ON-THE-NET (tm) SHAREWARE!!!
    By Inter.Pact Press
    "TERMINAL COMPROMISE" by Winn Schwartau A high tech thriller that comes from today's headlines! "The Tom Clancy of computer security." Assoc. Prof. Dr. Karen Forcht, James Madison University "Terminal Compromise" is a highly praised novel about the inva- sion of the United States by computer terrorists. Since it was first published in conventional print form, (ISBN: 0-962-87000-5) it has sold extremely well world-wide, but then again, it never hit the New York Times Bestseller List either. But that's OK, not many do. Recently, someone we know very well came up with a real bright idea. They suggested that INTER.PACT Press take the unprece-

    54. Project BookRead - FREE Online Book: "Terminal Compromise" By Winn Schwartau
    Terminal Compromise Winn Schwartau. (Includes 1 Year subscriptionto Security Insider Report. ) Distribution for up to 1000 people
    http://tanaya.net/Books/termc10/index1.html
    "Terminal Compromise"
    Winn Schwartau (Includes 1 Year subscription to "Security Insider Report.")
    Distribution for up to 1000 people on a single network: $ 3000
    (Includes 10 1 Year subscriptions to "Security Insider
    Report.")
    Distribution for up to 2500 people on a single network: $ 6250
    (Includes 1 Year electronic Corporate site license to
    "Security Insider Report.")
    Distribution for up to 5000 people on a single network: $ 10000
    (Includes 1 Year electronic Corporate site license to
    "Security Insider Report.") Distribution for up to 10000 people on a single network: $ 15000 (Includes 1 Year electronic Corporate site license to "Security Insider Report.") Distribution for up to 25000 people on a single network: $ 25000 (Includes 1 Year electronic Corporate site license to "Security Insider Report.") Distribution for more than that - Please call and we'll figure it out. Would you like us to coordinate a special distribution program for you? Would you like in Postscript or other visual

    55. Business Security References
    Inc. ; Chicago, Ill. Distributed in the USA by LPC Group, c2000. AUTHOR Schwartau,Winn. IMPRINT New York Free Press, 2000. AUTHOR Schwartau, Winn.
    http://www.neiu.edu/~ncaftori/business-ref.htm
    Business security References
    Bibliography
  • AUTHOR Quarantiello, Laura E., 1968-
  • TITLE Cyber crime : how to protect yourself from computer criminals
  • IMPRINT Lake Geneva, WI : Limelight Books, c1997.
  • AUTHOR McMahon, David.
  • TITLE Cyber threat : Internet security for home and business /
  • IMPRINT Toronto : Warwick Pub. Inc. ; Chicago, Ill. : Distributed in the U.S.A. by LPC Group, c2000.
  • AUTHOR Schwartau, Winn.
  • TITLE Cybershock : surviving hackers, phreakers, identity thieves, internet terrorists and weapons of mass disruption /
  • IMPRINT New York : Thunder's Mouth Press, 2000.
  • AUTHOR Jennings, Charles, 1948-
  • TITLE The hundredth window : protecting your privacy and security > in the age of the Internet / Charles Jennings and Lori Fena ; foreword by Esther Dyson.
  • IMPRINT New York : Free Press, 2000. Forensics-related references. other references. Return Last changed 01/02/03 var site="sm3path"
  • 56. TERMINAL COMPROMISE By Winn Schwartau
    TERMINAL COMPROMISE by Winn Schwartau. THE WORLD'S FIRST NOVELON-THE-NET(tm) SHAREWARE!!! By Inter.Pact Press A high tech thriller
    http://koapp.narod.ru/english/fantast/book64.htm

    57. LitSearch: An Online Literary Database
    Schwartau, Winn (00) Works by this author Terminal Compromise computerterrorism when privacy and freedom are the victims a novel.
    http://daily.stanford.edu/litsearch/servlet/DescribeAuthor?name=Schwartau, Winn

    58. LitSearch: An Online Literary Database
    Marshall Savage, Ernest Albert Scavezze, Dan Schiller, Friedrich Schiller, JohannChristoph Friedrich von Schreiner, Olive Schwartau, Winn Scott, Leroy Scott
    http://daily.stanford.edu/litsearch/servlet/DescribeAuthor?name=S

    59. Network Security From The Pros
    2000. Hack Proofing Your Network Internet Tradecraft. SyngressRockland, MA. Schwartau,Winn. 2000. Thunder's Mouth Press New York. Schwartau, Winn. 1994.
    http://www.pdaconsulting.com/biblio.htm
    home our services about Peter Davis+Assoc. contact ... Windows NT/2000/XP and .NET Security
    Business
    Bergeron, Bryan. 2002. Dark Ages II: When the Digital Data Die . Prentice Hall: Upper Saddle River, NJ. Berners-Lee, Tim with Mark Fischetti. 1999. Weaving the Web . HarperCollins: New York. Coderre, David G. 1998. CAATTs and other Beasts for Auditors . Global Audit Publications: Vancouver, BC. Comer, Michael J., Patrick M. Ardis and David H. Price. 1988. Bad Lies in Business . McGraw-Hill: London. Davis, Stan and Bill Davidson. 1991. 2020 Vision Davis, Stanley M. 1987. Future Perfect . Addison-Wesley Publishing Company, Inc.: Reading, MA. Gelernter, David. 1991. Mirror Worlds or: The Day Software Puts the Universe in a Shoebox...How It Will Happen and What It Will Mean . Oxford University Press, Inc.: New York.

    60. SearchWebServices.com
    The Author. Winn Schwartau (Winn@interpactinc.com) is the Presidentof Interpact, Inc., a security awareness consulting firm. His
    http://www.searchwebservices.com/originalContent/0,289142,sid26_gci770991,00.htm
    Search our content and thousands of pre-screened web sites. Advanced Search More headlines E-mail a friend How to Break Into a Network with Only Three Keystrokes
    By Winn Schwartau
    19 Sep 2001, availability.com
    How to Break Into a Network with Only Three Keystrokes

    By Winn Schwartau
    Thinking of installing a wireless network? Think again. Columnist Winn Schwartau reveals just how simple it is to break into wireless networks, even encrypted systems. Although we deliberately omit describing some key components of the hack attack kit to prevent intruders from wrecking havoc, those missing pieces are all too readily available. It used to take a certain amount of talent to break into a computer network, but not any more. Run a scanner, look for holes, download passwords or generate buffer overflows and you're in! Today, breaking into a corporate network, not just their Web site, is even simpler. I've talked with people who believe that it's so simple that some companies should be prosecuted for stupidity. Not a bad idea, perhaps, but the cause may be that CIOs and security people are not aware of recent developments that leave their networks open to remote attack invisibly. How I Became a Cyber Criminal Without Even Knowing It.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 3     41-60 of 88    Back | 1  | 2  | 3  | 4  | 5  | Next 20

    free hit counter