...virus with email worm trait and started spreading via email on March 26, 1999 infecting tens of thousand within hours. It was one of the most serious epidemics in Internet history. 4. Melissa Virus * A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. * Melissa works with Microsoft Word 97, Microsoft Word 2000 and Microsoft Outlook 97 or 98 e-mail client. You don't need to have Microsoft Outlook to receive the virus in e-mail, but it will not spread itself further without it. * Melissa will not work under Word 95 and will not spread further under Outlook Express. * Melissa can infect Windows 95, 98, NT and Macintosh users. If the infected machine does not have Outlook or internet access at all, the virus will continue to spread locally within the user's own documents. Propagation * Melissa was initially distributed in an internet discussion group called alt.sex. The virus was sent in a file called LIST.DOC, which contained passwords for X-rated websites. * When users downloaded the file and opened it in Microsoft Word, a macro inside the document executed and e-mailed the LIST.DOC file to 50 people listed in the user's e-mail alias file ("address book"). Fixes Available * Block messages with the signature of this virus at your mail transfer agents or other central point of control. * Utilize virus scanners * Encourage users...
Words: 444 - Pages: 2
...Medical Smart Card System for Patient Record Management Changrui Xiao and Arthur Yu Bears Breaking Boundaries 2009 Science, Technology, and Energy Policy White Paper Competition Executive Summary (Abstract) Rising healthcare spending has led to an increase in calls for ways to reduce the cost of healthcare. Amid the debate on the best approach on cut costs in the healthcare system, one of the few bipartisan provisions is the need to integrate modern technology into the storage and transfer of medical records. Current attempts to establish such electronic medical records are challenged by concerns about patient privacy, issues with the incorporation of old records, and budget limitations. We propose the development of personal portable healthcare record smart cards and a corresponding framework to simplify maintenance and transfer of patient records as an incremental step towards a nationalized electronic records system. Our proposal is a feasible and cost-effective system that applies existing technology to address inefficiencies of the current paper based medical records system; simultaneously, it also serves as a transition system to facilitate the adoption of completely electronic medical records. Author Affiliations: Xiao and Yu are both undergraduates at UC Berkeley. Contact Information: ayu.yua@gmail.com or crx687@berkeley.edu 1 1. Introduction During the second half of the 20th century, the national expenditure on healthcare increased dramatically. As of...
Words: 4983 - Pages: 20
...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................
Words: 134858 - Pages: 540
... Some of the places are hospitals, schools, fire department, banks, stores or supermarkets, stock exchange, police department, insurance companies, transport companies, and government agencies etc. What is a computer? A computer is many things to many people, depending on what it is being used for. At one time the computer can be a machine which processes the payroll, then it can be a machine which tabulates students’ grades, then a machine which stimulates the loading on a bridge, then it processes insurance policies, then it plays chess, and so on. It is important to note that all the above tasks, and many more, can be performed by the same computer. Definition: A computer is an electronic device that performs four functions: it inputs data (getting information into the machine); it...
Words: 67033 - Pages: 269
...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...
Words: 125224 - Pages: 501
...computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is an electronic device that accepts input data, processes data, stores data and produces output into useful information. Data is a collection of raw unprocessed facts, figures and symbols. Computers process data to create information. Information is data that is organized, meaningful, and useful. Whereas a system is a set of interrelated parts that performs different functions to achieve the same...
Words: 47755 - Pages: 192
...United States Government Accountability Office GAO February 2009 GAO-09-232G FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL (FISCAM) This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office Washington, DC 20548 February 2009 TO AUDIT OFFICIALS, CIOS, AND OTHERS INTERESTED IN FEDERAL AND OTHER GOVERNMENTAL INFORMATION SYSTEM CONTROLS AUDITING AND REPORTING This letter transmits the revised Government Accountability Office (GAO) Federal Information System Controls Audit Manual (FISCAM). The FISCAM presents a methodology for performing information system (IS) control 1 audits of federal and other governmental entities in accordance with professional standards, and was originally issued in January 1999. We have updated the FISCAM for significant changes affecting IS audits. This revised FISCAM reflects consideration of public comments received from professional accounting and auditing organizations, independent public accounting firms, state and local audit organizations, and interested individuals on the FISCAM Exposure Draft issued on July 31, 2008 (GAO-08-1029G)...
Words: 174530 - Pages: 699
...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...
Words: 241803 - Pages: 968
...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...
Words: 139438 - Pages: 558
...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...
Words: 204343 - Pages: 818
...Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and Design for the Small Enterprise, Third Edition • Harris Security Management of Information Security, Second Edition • Whitman, Mattord Principles of Information Security, Third Edition • Whitman, Mattord Readings and Cases in the Management of Information Security • Whitman...
Words: 223685 - Pages: 895
...Study Guide for the Certification Examination Fifth Edition ACAMS.org ACAMS.org/español ACAMSToday.org MoneyLaundering.com Study Guide for the Certification Examination Fifth Edition a publication of the association of certified anti-money laundering specialists Study Guide for the Certification Examination Fifth Edition Executive Vice President John J. Byrne, CAMS Editor Robert S. Pasley, CAMS Co-Editor Kevin M. Anderson, CAMS Contributors Joyce Broome, CAMS Heather Brown, CAMS Aub Chapman, CAMS Vasilios Chrisos, CAMS David Clark, CAMS Jurgen Egberink, CAMS Michael D. Kelsey, CAMS Saskia Rietbroek, CAMS Nancy J. Saur, CAMS Mansoor Siddiqi, CAMS Daniel Soto, CAMS Timothy White CAMS Production Assistant Catalina Martinez We would like acknowledge the following individuals for their contributions to the CAMS Exam, and the Online and Live Preparation Seminars: Kevin M. Anderson, CAMS Joyce Broome, CAMS Aub Chapman, CAMS David Clark, CAMS Josue Garcia, CAMS Hoi Luk, CAMS Ira Morales Mickunas, CAMS Robert S. Pasley, CAMS Karim Rajwani, CAMS Mansoor Siddiqi, CAMS Saskia Rietbroek, CAMS Ed Rodriguez, CAMS Nancy J. Saur, CAMS Wendy Steichen, CAMS Brian J. Stoeckert, CAMS Charles Taylor, CAMS Will Voorhees, CAMS Natalie Ware, CAMS Peter Warrack, CAMS Amy Wotapka, CAMS Crispin Yuen, CAMS Copyright © 2012 by the Association of Certified Anti-Money Laundering Specialists (ACAMS). Miami, USA. All rights...
Words: 105184 - Pages: 421
...Tenth Anniversary Edition Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK TELECOMMUNICATIONS REGULATION HANDBOOK The Telecommunications Regulation Handbook is essential reading for anyone involved or concerned by the regulation of information and communications markets. In 2010 the Handbook was fully revised and updated to mark its tenth anniversary, in response to the considerable change in technologies and markets over the past 10 years, including the mobile revolution and web 2.0. The Handbook reflects modern developments in the information and communications technology sector and analyzes the regulatory challenges ahead. Designed to be pragmatic, the Handbook provides a clear analysis of the issues and identifies the best regulatory implementation strategies based on global experience. February 2011 – SKU 32489 Edited by Colin Blackman and Lara Srivastava Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK Edited by Colin Blackman and Lara Srivastava Telecommunications Regulation Handbook Tenth Anniversary Edition Edited by Colin Blackman and Lara Srivastava ©2011 The International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication Union All rights reserved 1 2 3 4 14 13 12 11 This volume is a product of the staff of the International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication...
Words: 132084 - Pages: 529
...MBA In A Day What You Would Learn at Top-Tier Business Schools (If You Only Had the Time!) Steven Stralser, Ph.D. John Wiley & Sons, Inc. TLFeBOOK More Praise for MBA In A Day® “Steve Stralser is a unique talent. It is unusual to meet people who are both highly professional as well as generous with their knowledge. Not only is Professor Stralser’s advice invaluable for business professionals, but those in the arts who are more focused on their creative endeavors would benefit from reading MBA In A Day® to help strengthen their business skills.” —Bobi Leonard, CEO, Arcara Enterprises, Inc. “Steve’s book is a valuable asset to anyone needing to avoid the pitfalls of business, be they a small business owner, a physician, a lawyer, or just about anyone who deals with business. Just because you have not had the opportunity to study for a formal MBA, why be at a disadvantage in the business world? In just a few days of quality reading time you will level the playing field. Let your own brainpower do the rest.” —George Reiss, MD, Clinical Instructor, Mayo Clinic; Eye Physician, Phoenix Coyotes Professional Hockey Club “Professor Stralser’s MBA In A Day® contains insights that are incredibly valuable for any entrepreneur obsessed with success. They provide quick access to sound practical thinking on the real-world business issues most likely to confront the busy start-up entrepreneur.” —Michael Hool, Partner, Rogers & Theobald, LLC; Chairman, Arizona...
Words: 92092 - Pages: 369
...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...
Words: 190498 - Pages: 762