WorldCat Identities

Rubin, Aviel D.

Overview
Works: 23 works in 73 publications in 5 languages and 2,660 library holdings
Genres: Conference proceedings  Documentary films 
Classifications: TK5105.875.I57, 005.8
Publication Timeline
Key
Publications about  Aviel D Rubin Publications about Aviel D Rubin
Publications by  Aviel D Rubin Publications by Aviel D Rubin
Most widely held works by Aviel D Rubin
Brave new ballot : the battle to safeguard democracy in the age of electronic voting by Aviel D Rubin ( Book )
6 editions published in 2006 in English and held by 723 WorldCat member libraries worldwide
The computer expert who exposed the security glitches in the Diebold electronic voting machine details the technical and legal problems with the machine, the vulnerability of computerized systems to tampering, and the potential for using electronic voting to rig an election
Firewalls and Internet security : repelling the wily hacker by William R Cheswick ( Book )
19 editions published between 2003 and 2007 in English and Chinese and held by 662 WorldCat member libraries worldwide
Introduces the authors' philosophy of Internet security, explores possible attacks on hosts and networks, discusses firewalls and virtual private networks, and analyzes the state of communication security
Financial cryptography and data security 10th international conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers by Giovanni Di Crescenzo ( )
7 editions published in 2006 in English and held by 455 WorldCat member libraries worldwide
Annotation
Web security sourcebook by Aviel D Rubin ( Book )
8 editions published in 1997 in English and held by 322 WorldCat member libraries worldwide
Here's book that's valuable today and indispensable for the future. It includes basic and advanced techniques for client-side and server-side security, browser security, writing secure CGI scripts, firewalls, and secure e-commerce. There's a special appendix that demystifies the complex world of cryptography. And the book comes with access to a dedicated Web site containing up-to-the-minute information on the latest security threats and solutions. So whether you're a Webmaster trying to close the door on sites and applications, or an everyday user hoping to keep your desktop safe, this is your essential source on protecting and securing Web pages, search engines, servers, and browsers; writing impregnable applets and scripts, and avoiding the dangers inherent in every language; using (and abusing) firewalls and cryptographic controls; and securing commerce and payment transactions
White-hat security arsenal : tackling the threats by Aviel D Rubin ( Book )
7 editions published in 2001 in English and held by 223 WorldCat member libraries worldwide
Invisible ballots a temptation for electronic vote fraud ( Visual )
2 editions published in 2004 in English and held by 135 WorldCat member libraries worldwide
"Governments are installing computerized voting systems with no paper record to verify accuracy. Elections will be controlled by companies that do not allow voters to inspect their software. If vote counting becomes privatized, there may be no way to get it back"--Container
Firewalls und Sicherheit im Internet : Schutz vor cleveren Hackern by William R Cheswick ( Book )
1 edition published in 2004 in German and held by 48 WorldCat member libraries worldwide
Hackerabwehr und Datensicherheit : Angriff, Diagnose, Abwehr by Aviel D Rubin ( Book )
3 editions published between 2001 and 2002 in German and English and held by 45 WorldCat member libraries worldwide
Firewalls e sicurezza in rete by William R Cheswick ( Book )
2 editions published in 2003 in Italian and held by 7 WorldCat member libraries worldwide
Analysis of an electronic voting system ( Book )
2 editions published between 2003 and 2004 in English and held by 6 WorldCat member libraries worldwide
A survey of some existing IVHS systems, their functionality, and how they are achieved by Aviel D Rubin ( Book )
1 edition published in 1991 in English and held by 5 WorldCat member libraries worldwide
A first design of phase II of DART by Aviel D Rubin ( Book )
1 edition published in 1990 in English and held by 5 WorldCat member libraries worldwide
Ileus und ileusartige Zustände im frühen Kindesalter; abdominale Leeraufnahme by Antonín Rubin ( Book )
3 editions published in 1967 in German and Undetermined and held by 4 WorldCat member libraries worldwide
A security analysis of the Secure Electronic Registration and Voting Experiment (SERVE) ( )
1 edition published in 2004 in English and held by 4 WorldCat member libraries worldwide
Web security ( Book )
1 edition published in 2005 in English and held by 3 WorldCat member libraries worldwide
Nonmonotonic cryptographic protocols by Aviel D Rubin ( )
2 editions published in 1994 in English and held by 3 WorldCat member libraries worldwide
Exploiting software : how to break code by Greg Hoglund ( Book )
1 edition published in 2004 in English and held by 2 WorldCat member libraries worldwide
How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. This book is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out. Learn about why software exploit will continue to be a serious problem, when network security mechanisms do not work, attack patterns, reverse engineering, classic attacks against server software, surprising attacks against client software, techniques for crafting malicious input, the technical details of buffer overflows, and rootkits
Firewalle i bezpieczeństwo w sieci : vademecum profesjonalisty by William R Cheswick ( Book )
1 edition published in 2003 in Polish and held by 2 WorldCat member libraries worldwide
Protocols for authenticated download to mobile information appliances by Trent Jaeger ( Book )
1 edition published in 1995 in English and held by 2 WorldCat member libraries worldwide
Abstract: "Mobile hosts download files from untrusted networks to obtain application software, information services, documents, etc. However, attackers can modify the contents of these files, either in transit or on a compromised machine. Attacks are more likely on a mobile network than a fixed network because attackers can send a malicious message to a mobile host without having to break into any machine in the network. If an attack goes undetected, the mobile host may download a file that contains: (1) erroneous or misleading data; (2) faulty applications; and (3) Trojan horses or viruses. Therefore, mobile hosts need the ability to authenticate the files they download to verify that the file downloaded is the file requested. It is difficult to authenticate files because, in general, a mobile host cannot trust any of the servers that provide location information. In this paper, we define download protocols that locate and retrieve files from an untrusted network and authenticate the downloaded file using only a single trusted principal. Energy consumption is also a concern for mobile hosts, so the protocols are designed to minimize the amount of information a mobile host will need to download."
Quan qiu zi xun wang : an quan fang hu shou ce by Aviel D Rubin ( Book )
1 edition published in 1998 in Chinese and held by 1 WorldCat member library worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.44 (from 0.07 for Quan qiu z ... to 1.00 for A first de ...)
Alternative Names
Rubin, A.
Rubin, A. D. (Aviel D.)
Rubin, Avi
Rubin, Avi (Aviel D.)
Rubin, Aviel David, 1967-
Languages
English (58)
German (5)
Chinese (3)
Italian (2)
Polish (1)
Covers