Check out the new USENIX Web site. Security '98 Symposium
 
 
Table of Contents
Tutorials at-a-Glance
Full day tutorials run from 9:00 am to 5:00 pm. Half-day tutorials, marked AM or PM run either from 9:00 am to 12:30 pm or from 1:30 pm to 5:00 pm. Full-day tutorials may not be split.
Monday, January 26
M1
Security on the World Wide Web
Daniel Geer, CertCo, LLC, and Jon Rochlis, SystemExperts Corp.

M2  NEW!
Windows NT Security
Rik Farrow, Consultant

M3AM   NEW!
Certification: Identity, Trust, and Empowerment
Carl M. Ellison, CyberCash, Inc.

M4PM   NEW!
Towards Secure Executable Content: Java Security
Gary McGraw, Reliable Software Technologies

 
Tuesday, January 27
T1
Handling Computer and Network Security Incidents
Jim Duncan, Penn State University, and Rik Farrow, Consultant

T2
Network Security Profiles: What Every Hacker Already Knows About You, and What To Do About It
Jon Rochlis and Brad Johnson, SystemExperts Corp.

T3AM   NEW!
Using Cryptography
Bruce Schneier, Counterpane Systems

T4PM   NEW!
Cryptography for the Internet
Bruce Schneier, Counterpane Systems
 

Register early for tutorials - they often sell out!

Tutorials Overview    Symposium Speakers

 


Symposium at-a-Glance - Tutorials - Technical Program - Registration -
About Symposium Speakers - Symposium Info - Hotel & Travel Info - Security 98 brochure HOME
Symposium Index
Events Calendar
USENIX home