skip to content
Computer related risks Preview this item
ClosePreview this item

Computer related risks

Author: Peter G Neumann
Publisher: New York, NY ACM Press Reading, Mass. Addison Wesley 1995
Edition/Format:   Print book : English : Reprinted with corrView all editions and formats

This book presents the various computer-related risks, describes events drawn from the author's comprehensive data archive on computing mishaps, and suggests ways to lessen such risks in the future.  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Peter G Neumann
ISBN: 020155805X 9780201558050
OCLC Number: 844312038
Description: XV, 367 Seiten 24 cm
Contents: 1. The Nature Of Risks. Background on Risks.Sources of Risks.Adverse Effects.Defensive Measures.Guide to Summary Tables.2. Reliability And Safety Problems. Communication Systems.Problems in Space.Defense.Civil Aviation.Trains.Ships.Control-System Safety.Robotics and Safety.Medical Health and Safety.Electrical Power.Computer Calendar Clocks.Computing Errors.3. Security Vulnerabilities. Security Vulnerabilities and Misuse Types.Pest Programs and Deferred Effects.Bypass of Intended Controls.Resource Misuse.Other Attack Methods.Comparison of the Attack Methods.Classical Security Vulnerabilities.Avoidance of Security Vulnerabilities.4. Causes And Effects. Weak Links and Multiple Causes.Accidental versus Intentional Causes.5. Security And Integrity Problems. Intentional Misuse.Security Accidents.Spoofs and Pranks.Intentional Denials of Service.Unintentional Denials of Service.Financial Fraud by Computer.Accidental Financial Losses.Risks in Computer-Based Elections.Jail Security.6. Threats To Privacy And Well-Being. Needs for Privacy Protection.Privacy Violations.Prevention of Privacy Abuses.Annoyances in Life, Death, and Taxes.What's in a Name?Use of Names as Identifiers.7. A System-Oriented Perspective. The Not-So-Accidental Holist: A System View.Putting Your Best Interface Forward.Distributed Systems.Woes of System Development.Modeling and Simulation.Coping with Complexity.Techniques for Increasing Reliability.Techniques for Software Development.Techniques for Increasing Security.Risks in Risk Analysis.Risks Considered Global(ly).8. A Human-Oriented Perspective. The Human Element.Trust in Computer-Related Systems and in People.Computers, Ethics, and the Law.Mixed Signals on Social Responsibility.Group Dynamics.Certification of Computer Professionals.9. Implications And Conclusions. Where to Place the Blame.Expect the Unexpected!Avoidance of Weak Links.Assessment of the Risks.Assessment of the Feasibility of Avoiding Risks.Risks in the Information Infrastructure.Questions Concerning the NII.Avoidance of Risks.Assessment of the Future. 020155805XT04062001
Responsibility: Peter G. Neumann


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Computer related risks
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "844312038" ;
   library:placeOfPublication <> ; # New York, NY
   library:placeOfPublication <> ; # Reading, Mass.
   library:placeOfPublication <> ;
   schema:about <> ; # Computersicherheit
   schema:about <> ; # Risikomanagement
   schema:about <> ;
   schema:about <> ; # Electronic--Reliability
   schema:about <> ; # Computer security
   schema:about <> ; # Computer security
   schema:about <> ; # Datensicherung
   schema:about <> ; # Risk management
   schema:bookEdition "Reprinted with corr" ;
   schema:bookFormat bgn:PrintBook ;
   schema:creator <> ; # Peter G. Neumann
   schema:datePublished "1995" ;
   schema:exampleOfWork <> ;
   schema:inLanguage "en" ;
   schema:name "Computer related risks" ;
   schema:productID "844312038" ;
   schema:publication <> ;
   schema:publication <> ;
   schema:publisher <> ; # ACM Press
   schema:publisher <> ; # Addison Wesley
   schema:url <> ;
   schema:workExample <> ;
   wdrs:describedby <> ;

Related Entities

<> # Addison Wesley
    a bgn:Agent ;
   schema:name "Addison Wesley" ;

<> # Computersicherheit
    a schema:Intangible ;
   schema:name "Computersicherheit" ;

<> # Electronic--Reliability
    a schema:Intangible ;
   schema:name "Electronic--Reliability" ;

<> # Computer security
    a schema:Intangible ;
   schema:name "Computer security" ;

<> # Computer security
    a schema:Intangible ;
   schema:name "Computer security" ;

<> # Peter G. Neumann
    a schema:Person ;
   schema:birthDate "1932" ;
   schema:familyName "Neumann" ;
   schema:givenName "Peter G." ;
   schema:name "Peter G. Neumann" ;

    a schema:ProductModel ;
   schema:isbn "020155805X" ;
   schema:isbn "9780201558050" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.