0%

Book Description

"This sobering description of many computer-related failures throughout our world deflates the hype and hubris of the industry. Peter Neumann analyzes the failure modes, recommends sequences for prevention and ends his unique book with some broadening reflections on the future." —Ralph Nader, Consumer Advocate

This book is much more than a collection of computer mishaps; it is a serious, technically oriented book written by one of the world's leading experts on computer risks. The book summarizes many real events involving computer technologies and the people who depend on those technologies, with widely ranging causes and effects. It considers problems attributable to hardware, software, people, and natural causes. Examples include disasters (such as the Black Hawk helicopter and Iranian Airbus shootdowns, the Exxon Valdez, and various transportation accidents); malicious hacker attacks; outages of telephone systems and computer networks; financial losses; and many other strange happenstances (squirrels downing power grids, and April Fool's Day pranks).

Computer-Related Risks addresses problems involving reliability, safety, security, privacy, and human well-being. It includes analyses of why these cases happened and discussions of what might be done to avoid recurrences of similar events. It is readable by technologists as well as by people merely interested in the uses and limits of technology. It is must reading for anyone with even a remote involvement with computers and communications—which today means almost everyone.

Computer-Related Risks:

  • Presents comprehensive coverage of many different types of risks

  • Provides an essential system-oriented perspective

  • Shows how technology can affect your life—whether you like it or not!

  • Table of Contents

    1. Title Page
    2. Copyright Page
    3. Contents
    4. Preface
    5. Preface to the Fourth Printing
    6. Chapter 1. The Nature of Risks
    7. Chapter 2. Reliability and Safety Problems
    8. Chapter 3. Security Vulnerabilities
    9. Chapter 4. Causes and Effects
    10. Chapter 5. Security and Integrity Problems
    11. Chapter 6. Threats to Privacy and Well-Being
    12. Chapter 7. A System-Oriented Perspective
    13. Chapter 8. A Human-Oriented Perspective
    14. Chapter 9. Implications and Conclusions
    15. Epilogue
    16. Appendix A. Background Materials
    17. Notes
    18. References
    19. Glossary
    20. Index
    3.141.8.247