WorldCat Identities

Bellovin, Steven M.

Overview
Works: 25 works in 51 publications in 5 languages and 779 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Other, Editor
Publication Timeline
.
Most widely held works by Steven M Bellovin
Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings by John Ioannidis( )

13 editions published in 2008 in English and held by 486 WorldCat member libraries worldwide

"The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Communi-cations and Information Security Association). It was held at Columbia University in New York, USA, J une 7-10, 2005."
Thinking security : stopping next year's hackers by Steven M Bellovin( )

10 editions published between 2015 and 2016 in English and Undetermined and held by 202 WorldCat member libraries worldwide

You already know the endless list of security "do's and don'ts": run AV software and firewalls, lock everything down, encrypt everything, watch all your network traffic, follow checklists But even if you're spending a fortune doing all that, you're at greater risk than ever: even the world's most security-focused organizations are being victimized by massive attacks
Zi xun an quan guan li : fang huo qiang yu wang lu an quan by Qi si wo( Book )

1 edition published in 2003 in Chinese and held by 21 WorldCat member libraries worldwide

Provably Secure Networks: Methodology and Toolset for Configuration Management by Cornelius Hermann Diekmann( Book )

1 edition published in 2017 in English and held by 16 WorldCat member libraries worldwide

Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings by Steven M Bellovin( )

2 editions published in 2008 in English and held by 12 WorldCat member libraries worldwide

Insider attack and cyber security : beyond the hacker by Salvatore J Stolfo( )

3 editions published in 2008 in English and Undetermined and held by 12 WorldCat member libraries worldwide

"Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of the insider attack problem as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Computer Science Departments of Columbia University and Dartmouth College." "This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer security, and includes the following topics: critical IT infrastructure protection, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks." "Insider Attack and Cyber Security: Beyond the Hacker is designed for a professional audience composed of researchers and practitioners in industry. It is also suitable as an advanced-level text or reference book for students in computer science and electrical engineering."--Jacket
Firewall e sicurezza in rete by William R Cheswick( Book )

1 edition published in 2003 in Italian and held by 7 WorldCat member libraries worldwide

Verifiably correct code generation using predicate transformers by Steven M Bellovin( )

1 edition published in 1982 in English and held by 3 WorldCat member libraries worldwide

Large Scale System Defense( Book )

2 editions published in 2008 in English and held by 2 WorldCat member libraries worldwide

The objective of this effort was to investigate techniques for allowing networks composed of many hundreds, thousands, or even millions of commodity computers to protect themselves against a variety of security threats. As a result we developed a number of system prototypes and experimentally demonstrated their effectiveness: an automatic patch generation prototype that can detect previously unknown attacks and create fixes that maintain both integrity and availability of the target application in over 95% of cases with minimal performance overhead; a technique for allowing in situ testing of security patches without affecting the stability or functionality of the production system, using speculative parallel execution; Anagram, a new content-based anomaly detection (AD); Aeolos, a distributed intrusion detection and event correlation infrastructure; STAND, a training-set sanitization technique applicable to ADs requiring unsupervised training; POLYMORPH, an evaluation of the strength of metamorphic engines demonstrating the infeasibility of signature-based filtering devices; and an integrated software diversification system based on Instruction Set Randomization
Internet security by William R Cheswick( Book )

2 editions published in 1996 in English and held by 2 WorldCat member libraries worldwide

Firewalle i bezpieczeństwo w sieci : vademecum profesjonalisty by William R Cheswick( Book )

1 edition published in 2003 in Polish and held by 2 WorldCat member libraries worldwide

Fang Huo Qiang Yu Yin Te Wang An Quan by William R Cheswick( Book )

1 edition published in 2000 in Chinese and held by 1 WorldCat member library worldwide

Building trustworthy systems : lessons from the PTN and internet by Fred B Schneider( )

1 edition published in 1999 in English and held by 1 WorldCat member library worldwide

SRUTI '06 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet ; July 7, 2006, San Jose, CA( )

1 edition published in 2006 in English and held by 1 WorldCat member library worldwide

Zi xun an quan guan li = Firewalls and Internet security:repelling the wily hacker : fang huo qiang yu wang lu an quan by Qi si wei ke( Book )

1 edition published in 2007 in Chinese and held by 1 WorldCat member library worldwide

Zu ji hei ke : Ji shu,Ce lüe yu an li = Thinking security by Steven M Bellovin( Book )

1 edition published in 2017 in Chinese and held by 1 WorldCat member library worldwide

Ben shu di 1 bu fen cong wen ti ding yi kai shi,Cong xi tong hua de jiao du kan dai an quan,Tao lun dang qian an quan fa zhan de bian hua,An quan de si wei fang shi,Mu biao,Bing qie fen xi le bu tong de wei xie mo xing;Zai ci ji chu zhi shang,Di 2 bu fen jie shao an quan xiang guan de ji shu,Chu le dui ji shu ben shen jin xing jie shao zhi wai,Zuo zhe hai hen hao di kao lü le bu tong qing kuang,Bu tong xu qiu,Yi ji zai ying dui bu tong wei xie mo xing shi,Ge zhong ji shu de you shi he ke neng mian lin de wen ti;Di 3 bu fen jie shao ju ti de an quan cao zuo,Ji ru he chuang jian an quan de xi tong,Kao lü le bao kuo dai ma,She ji,Jia gou,Guan li yi ji ren yuan deng zhong duo zong he yin su;Di 4 bu fen fen xi ju ti an li,Bing qie dui wei lai de ji shu fa zhan he ying dui ji chu le jian yi
SRUTI '07 3rd Workshop on Reducing Unwanted Traffic on the Internet ; July 18, 2007, Santa Clara, CA( )

1 edition published in 2007 in English and held by 1 WorldCat member library worldwide

Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R Cheswick( Book )

1 edition published in 2003 in English and held by 1 WorldCat member library worldwide

Saenggak haneun boan( Book )

1 edition published in 2016 in Korean and held by 1 WorldCat member library worldwide

Solaris security by Peter H Gregory( Book )

1 edition published in 2000 in English and held by 1 WorldCat member library worldwide

"Learn the specifics for making your system secure, whether it's an organization-wide network or a standalone workstation."--BOOK JACKET. "Every chapter opens with a checklist of key topics and their significance, so you can quickly find the information you need. Whether you are a security manager, information technology/systems manager or a network administrator, Solaris Security is the single resource to answer all your questions and get your systems in shape now and for the future."--Jacket
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.56 (from 0.39 for Building t ... to 0.99 for Zu ji hei ...)

Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
Covers
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. ProceedingsInsider attack and cyber security : beyond the hackerInternet securitySolaris security
Alternative Names
Bellovin Stephen M.

Bellovin, Steven Michael.

Steven Bellovin informaticien américain

Steven Bellovin US-amerikanischer Informatiker

Steven M. Bellovin Amerikaans informaticus

Languages