By Topic

Guest Editors' Introduction: Living with Insecurity

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
2 Author(s)
William Arbaugh ; University of Maryland ; Deborah A. Frincke

All computers today operate in a hostile environment. The only difference between large enterprises, small businesses, governments, and home users is the degree of hostility faced. How we deal with these threats and what we do to improve the situation are vitally important to our future. This issue tackles some of the salient points from how we create these problems ourselves to what we can do to mitigate threats.

Published in:

IEEE Security & Privacy  (Volume:9 ,  Issue: 6 )