Revisiting the need to educate professionals to defend against malware in its various guises.
C omputer security courses are typically of two kinds. Most are of the first kind: guided tours to concepts and terminology, descriptive courses that inform and acquaint. These courses have few or no prerequisites and little technical content. The second kind of computer security courses is taken primarily by computer science majors. Usually elective… (More)
This is a marvelous book. I highly recommend it. If you are not acquainted with cryptology, this book is a great way to start. The authors provide explanations and examples and each chapter concludes with problems for solution. If you are familiar with cryptology but are not a practitioner, this book is an excellent overview of what you may already know and… (More)
W hen Wendell Phillips (an American abolitionist and reformer) told a Boston audience in 1852 that " Eternal vigilance is the price of liberty, " he did not anticipate the advent of wireless sensor networks (WSNs). WSNs are a new technology that will help us be vigilant. Wireless networks and sensors are not new. However , deploying very large numbers of… (More)