Geometry.Net - the online learning center
Home  - Book_Author - Schwartau Winn
e99.com Bookstore
  
Images 
Newsgroups
Page 1     1-20 of 45    1  | 2  | 3  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Schwartau Winn:     more books (19)
  1. Information Warfare: Second Edition by Winn Schwartau, 1996-11-01
  2. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau, 2001-03-30
  3. Time Based Security by Winn Schwartau, 1999-02-01
  4. Information Warfare by Winn Schwartau, 2010-09-07
  5. Pearl Harbor Dot Com by Winn Schwartau, 2002-01-01
  6. Complete Internet Business Toolkit by Winn Schwartau, Chris Goggans, 1996-06
  7. Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.) by Winn Schwartau, 2001-04-01
  8. Terminal Compromise: Computer Terrorism in a Networked Society by Winn Schwartau, 1991-06
  9. Winn Schwartau - Terminal Compromise by Winn Schwartau, 2009-07-12
  10. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists by Winn Schwartau, 2000-01-01
  11. Low cost computer security.: An article from: Security Management by Winn Schwartau, 1994-06-01
  12. Cybershock by Winn Schwartau, 2000-01-01
  13. Pearl Harbor Dot Com by Winn Schwartau, 2002
  14. A Shitload of Practical Uses for the Most Flexible Word in the English Language: by Winn Schwartau, 2005-10-01

1. Winn Schwartau, Executive Speakers Bureau: - ZoomInfo Business Information
Schwartau, Winn SCIPP International Schwartau, Winn Interpact , Inc. Schwartau, Winn Global City.Com
http://www.zoominfo.com/people/Schwartau_Winn_610730644.aspx
Last Update on 11/29/06
Executive Speakers Bureau
P.O Box 382036 Memphis, Tennessee 38183
United States Executive Speakers Bureau, Founded by Angela Schelp in July 1993, is a full service speakers bureau. Based in Memphis Tennessee we offer hundreds of national...
Mr. Winn Schwartau
Phone Email Results found for this person at Intelius.com
More results for Schwartau

View More >> People directory A B C D ... Subscribe PRO_SEP2010_RC001.b.1[02]

2. Winn Schwartau, Founder, SCIPP International: - ZoomInfo Business Information
Schwartau, Winn Interpact , Inc. Schwartau, Winn Global City.Com Schwartau, Winn Executive Speakers Bureau
http://www.zoominfo.com/people/Schwartau_Winn_1222130121.aspx
Last Update on 8/30/09
SCIPP International
Winn Schwartau
Results found for this person at Intelius.com
More results for Schwartau

View More >> People directory A B C D ... Subscribe PRO_SEP2010_RC001.b.1[01]

3. Home - Winn Schwartau
Winn Schwartau IS Security. Winn was just a guest on the Rock the World with Linked In radio show. The show is available for free on their website, as well as for free download
http://www.winnschwartau.com/
Winn IS Security.
Winn was just a guest on the " Rock the World with Linked In radio show. The show is available for free on their website, as well as for free download through iTunes. Winn will discuss privacy in terms of social media and our online lives.
Winn recently wrote an article for Insecure Magazine on Security in the Mobile Enterprise. Get the issue here
(Pages 39 - 42)
Winn also appears in this article on Fox News about 10 Bizarre but True Ways Your Home is Susceptible to Hackers and in this article on Enterprise Wireless LAN Systems.
Download and read some of Winn's articles
See samples of Winn's speaking style.
Contact
The Security Awareness Company Trusted Learning SCIPP ... M.A.D.

4. Fred Cohen Associates
This is another one of those articles inspired by a discussion with Winn Schwartau. Winn is a nice guy and he has a tendency to stretch the edges of the envelope in his own way.
http://all.net/journal/netsec/1999-02.html
Fred Cohen
Specializing in Information Protection Since 1977
Managing Network Security
Managing Network Security Returning Fire by Fred Cohen
Series Introduction
Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programs has increasingly become a function of our ability to make prudent management decisions about organizational activities. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.
Ready!
This is another one of those articles inspired by a discussion with Winn Schwartau. Winn is a nice guy and he has a tendency to stretch the edges of the envelope in his own way. We were recently discussing some of the issues surrounding the US military decision to return fire on cyber attackers and the increasing willingness of corporate defenders to do the same, and it occurred to me that you, my readers, might like to hear about some of the issues that others have discussed in this area. I began consistently returning fire in a fairly gentile way by automatically notifying remote systems administrators of every attempted entry into my system beginning early in 1996. As the ferocity of the attempts went up, the number of notices went up, and at one point, it appears that I over-informed a site that was particularly malicious and they ran out of disk space because of the flood of email. Given that even this gentle sort of return of fire can result in such side effects, a natural question arises about the benefits and liabilities associated with such an activity.

5. Chegg.com: Internet And Computer Ethics For Kids By | 0962870056 | 9780962870057
Rent and Save a ton on Internet and Computer Ethics for Kids by Schwartau, Winn Busch, D. L..ISBN 0962870056 EAN 9780962870057
http://www.chegg.com/details/internet-and-computer-ethics-for-kids/0962870056/
mboxCreate('TT_Global_Mbox','pageName='+window.s.pageName, 'retCust=no', 'profile.retCust=no'); Sign In Rental Cart ( CHEGG.COM FIND YOUR BOOKS FIND BOOKS SEARCH TIPS x Search Tip: The best way to find your books is by searching using ISBNs. Alternatively, you can also search using book title or author's name. But better results are returned when you put in book title and one of the authors' name together. Here are some examples of good searches:
  • Managing Human Resources George George W. Bohlander
Home Computers Internet General
Internet and Computer Ethics for Kids
by
Schwartau, Winn
Busch, D. L.
ISBN:
EDITION: BINDING: PUBLISHER: Interpact Press (01/19/2000) PAGES: This product is not available.
SUMMARY This highly entertaining. colorful, and non-technical neutral discussion of the perils of the Internet for kids, families, and teachers "should be on the reading list of every parent whose child has access to a computer" (Congressman Tom Tancredo). SUMMARY This highly entertaining. colorful, and non-technical neutral discussion of the perils of the Internet for kids, families, and teachers "should be on the reading list of every parent whose child has access to a computer" (Congressman Tom Tancredo). Customer Service Media Center Mobile Bookstores ... Gift Certificates

6. Joel Birnbaum - Speaker Profile
Winn Schwartau Winn Schwartau balances his time between writing, lecturing, teaching, and building corporate and national securityawareness programs, and consulting to
http://www.keynotespeakers.com/speaker_detail.php?speakerid=4614

7. LIS 2004 Syllabus
Schwartau, Winn. Information Warfare Chaos on the Electronic Superhighway. New York Thunder's Mouth, 1994. Shoup, Stacey. The ABS's of Evaluating WWW Sources.
http://www.valenciacc.edu/lrcwest/lis2004/reading.htm
Home
Syllabus

Lesson 1

Lesson 2
...
Glossary

Reading
Reading List Ackerman, Ernest. Learning to Use the World Wide Web . Wilsonville, OR: Franklin, Beedle, 1997. Alexander, Janet E. and Marsha A. Tate. Web Wisdom: How to Evaluate and Create Information Quality on the Web . Mahwah, NJ: Erlbaum, 1999. Altschiller, Donald, ed. The Information Revolution . New York: Wilson, 1995. Bodi, Sonia. "Scholarship or Propaganda: How Can Librarians Help Undergraduates Tell the Difference?" Journal of Academic Librarianship Braun, Eric. The Internet Directory . New York: Faucett, 1994. Brook, James and Iain A. Boal, eds. Resisting the Virtual Life: The Culture and Politics of Information. SanFrancisco: City Lights, 1995. Brown, Mark R. . Indianapolis: Que, 1995. Carton, Sean. The Internet Power Toolkit . Chapel Hill: Ventana, 1996. Cronin, Mary J. Doing Business on the Internet: How the Electronic Highway is Transforming American Companies . New York: Van Nostrand, 1994. Crump, Eric. English Online: A Student's Guide to the Internet and World Wide Web . Boston: Houghton Miflin, 1997.

8. Articles By Author: Schwartau, Winn - Free Online Library
Free Online Library Articles by Schwartau, Winn 18,254,750 articles and books
http://www.thefreelibrary.com/Schwartau, Winn-a1646
CacheBuster('') Printer Friendly
18,320,781 articles and books Periodicals Literature Keyword Title Author Topic Member login User name Password Remember me Join us Forgot password? Submit articles free The Free Library
Browse Schwartau, Winn
out of article(s) Title Type Date Words Low cost computer security. Jun 1, 1994 Publications by Name Publications by Date Authors Literature A-D E-O P-T U-Z ... Submit articles

9. Information Warfare Tutorial
25 Schwartau, Winn. Information Warfare Chaos on the Electronic Superhighway. (New York, NY Thunder's Mouth Press, 1994.) Popular text on information warfare in general.
http://www.au.af.mil/au/awc/awcgate/iw-army/refer.htm
Return to Information Warfare Tutorial Intro/Contents
References
The following list of references are from an excellent paper written by Daniel E. Magsig titled Information Warfare: In the Information Age. Thanks to Daniel for all the effort in compiling this list with abstracts:
Return to Information Warfare Tutorial Intro/Contents

10. Free Ebook – Letter V
Relations with European Nations to the Close of the Nineteenth Century Various Scientific American Supplement, No. 286, June 25, 1881 - Books Vana Parva, Part 2 - Schwartau, Winn
http://www.interludic.com/letter/V.html
Slow Signal Fade ebooks
SEARCH A B C D ... Resources
By letter 'V'
Author
Various -
Various - Punch, or the London Charivari, Volume 1, September 25, 1841
Various - Scientific American Supplement, No. 623, December 10, 1887
Various - Punch, or the London Charivari, Volume 102, April 23, 1892
Various - The Atlantic Monthly, Volume 13, No. 75, January, 1864
Vance, Louis Joseph, 1879-1933 - The Day of Days An Extravaganza
Various - Scientific American Supplement, No. 455, September 20, 1884
Various - Georgian Poetry 1913-15
Various - ds from Their Earliest Relations with European Nations to the Close of the Nineteenth Century
Various - Scientific American Supplement, No. 286, June 25, 1881
Books
Vana Parva, Part 2

11. Terminal Compromise: Computer Terrorism: When Privacy And Freedom Are The Victim
Information on contacting Project Gutenberg to get Etexts, and further information is included below. We need your donations. Since the author also requests remuneration, we would ask
http://www.scribd.com/doc/2396668/Terminal-Compromise-computer-terrorism-when-pr

12. Parents As Internet Partners - Bibliography
Schwartau, Winn Interpact press, c2001 J004.678 R Internet and email Royston, Angela Heinemann Library c2002 J004.678 R Internet and e-mail
http://www.nassaulibrary.org/valleyst/Bibliography.htm
Parents As Internet Partners
Bibliography Computer Books and Video Acquired with a 2001/2002 Parents As Internet Partners Grant
from the New York State Education Dept.

J 005.2 D 101 things to do with your computer101 things to do with your computer Doherty, Gillian Usborne Publishing, c1998 J 025.04 L 300 incredible things for kids on the internet Leebow, Ken 300Incredible.com J 025.04 L 300 more incredible things to do on the internet, vol. II Leebow, Ken 300Incredible.com, c2000 J 005.72 P Build your own website Perry, Robert Franklin Watts, c2000 J FIC Dower Caught in the web Dower, Laura Volo/Hyperion, c2001 J 004.678 R Chilling out Rooney, Anne Sterling, c2000 J 394.2646 T Click it! Computer fun Halloween Trumbauer, Lisa Millbrook Press, c1999 J 371.334 B Collaborative projects using the internet Burgess, Betsy Teacher Created Materials, c2001 J 371.334 W Computer activities A-Z Weller, Alyssa Teacher Created Materials, c1999 J 004.678 G Computer activities through the year : grades 4-8 Gimotty, Susan L.

13. Vana Parva, Part 2 / Schwartau, Winn
Vana Parva, Part 2 / Schwartau, Winn
http://infomotions.com/etexts/gutenberg/dirs/1/2/3/3/12333/12333.htm

14. Asymmetric Warfare - January 2002, JFSC - Joint Forces Staff College - Norfolk,
Schwartau, Winn. “Asymmetrical Adversaries.” Orbis, vol. 44, no. 2, Spring 2000, pp. 197205. Shin, David W. “Future War
http://www.jfsc.ndu.edu/library/publications/bibliography/asymmetric.asp

15. Terminal Compromise: Computer Terrorism: When Privacy And Freedom Are The Victim
Terminal Compromise computer terrorism when privacy and fr by Schwartau, Winn Page 5 *****
http://www.wordiq.com/books/Terminal_Compromise:_computer_terrorism:_when_privac
Terminal Compromise: computer terrorism: when privacy and fr... by Schwartau, Winn Page 5
Prologue
Friday, January 12, The Year After The White House, Washington D.C.
The President was furious. In all of his professional political life, not even his closest aids or his wife had ever seen him so totally out of character. The placid Southern confidence he normally exuded, part well designed media image, part real, was completely shattered.
"Are you telling me that we spent almost $4 trillion dollars, four goddamn trillion dollars on defense, and we're not prepared to defend our computers? You don't have a game plan? What the hell have we been doing for the last 12 years?" The President bellowed as loudly as anyone could remember. No one in the room answered. The President glared right through each of his senior aides.
"Damage Assessment Potential?" The President said abruptly as he forced a fork full of scrambled eggs into his mouth.
"The Federal Reserve and most Banking transactions come to a virtual standstill. Airlines grounded save for emergency opera- tions. Telephone communications running at 30% or less of capacity. No Federal payments for weeks. Do you want me to continue?"
"No, I get the picture."

16. Infowar.com - Info War - Information Warfare/InfoSec
Registrant Interpact, Inc. 545 westport dr old hickory, TN 37138 US Domain Name INFOWAR.COM Administrative Contact, Technical Contact Schwartau, Winn
http://whois.domaintools.com/infowar.com

17. Kimi's Research Page
Schwartau, Winn. CyberShock surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption. New York Thunder’s Mouth Press, 2000.
http://www.unc.edu/~kgdavis/research.html

18. Computer Science September 2001
Libraries Unlimited 2000 CyberShock surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption Schwartau, Winn.
http://www.tblc.org/librare/pdf/computerscience-2001-09.pdf

19. 'Mad As Hell' Author Winn Schwartau Explains How He Got There, Where He's Headed
When security expert Winn Schwartau first declared he was Mad As Hell, he had no idea what kind of reaction he would elicit. He was simply fed up with what he calls a series of
http://www.macobserver.com/tmo/article/Mad_as_Hell_Author_Winn_Schwartau_Explain
  • iObserver
    June 23rd, 2005 at 3:00 PM - Reports by Brad Cook When security expert Winn Schwartau first declared he was "Mad As Hell," he had no idea what kind of reaction he would elicit. As someone who built his first computer at the age of nine and has been involved in the industry since the 1960s, he told The Mac Observer that he was simply fed up with what he calls "a series of collapses constant reboots, application memory leaks, the iblue screen of deathi in a short period of time. "Iive had it with the amount of downtime," he recalled saying. "Letis go try this [switching to the Mac] experiment. I had a fit and started writing about it. Then Network World wanted my next article, so I published iMad As Helli and started the blog at the same time." Mr. Schwartau is currently in the first phase of his experiment, having switched about half his firm, The Security Awareness Company , to Macs. The purchases he made to enable that switch several dual processor Power Mac G5s and several G4 PowerBooks were the first Mac purchases he ever made. He explained that while many of the thousands of readers who responded the traffic to his various Web sites rose by 30,000% took "Mad As Hell" as an anti-Windows rant, "itis not. Itis about system complexity." Reliability is iThrough the Roofi Specifically, he was concerned about something that many who use Macs have advocated for a long time: look at the total cost of ownership of a computer, when downtime because of viruses and other problems are taken into consideration. "One of the fundamental pieces of security is availability," he explained. "What does it cost to keep systems up and running? Thatis what I was concentrating on. And as I did that, I started looking at the side benefits of Mac OS X: security and so forth."

20. Terminal Compromise: Computer Terrorism: When Privacy And Freedom Are The Victim
Terminal Compromise computer terrorism when privacy and freedom are the victims a novel / Schwartau, Winn
http://infomotions.com/etexts/gutenberg/dirs/etext93/termc10.htm
Terminal Compromise: computer terrorism: when privacy and freedom are the victims: a novel / Schwartau, Winn
Author Schwartau, Winn Title Terminal Compromise: computer terrorism: when privacy and freedom are the victims: a novel Date Contributor(s) Christy, F. Earl [Illustrator] Size Identifier Language en Publisher Project Gutenberg Rights GNU General Public License Tag(s) Versions original local mirror plain HTML (this file)
concordance (most frequent 100 words, etc.)
... Alex Catalogue of Electronic Texts Share addthis_url = location.href; addthis_title = document.title; addthis_pub = 'ericleasemorgan';
Colophon
This file was acquired from Project Gutenberg, and it is in the public domain. It is re-distributed here as a part of the Alex Catalogue of Electronic Texts (http://infomotions.com/alex/) by Eric Lease Morgan (Infomotions, Inc.) for the purpose of freely sharing, distributing, and making available works of great literature. Its Infomotions unique identifier is etext79, and it should be available from the following URL: http://infomotions.com/etexts/gutenberg/dirs/etext93/termc10.htm

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 1     1-20 of 45    1  | 2  | 3  | Next 20

free hit counter