The Fox Herder's Guide

The Fox Herder's Guide

by William Boebert, Russell Boebert

NOOK Book(eBook)


Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now
LEND ME® See Details

Product Details

BN ID: 2940012858467
Publisher: Bitsmasher Press LLC
Publication date: 07/08/2011
Sold by: Barnes & Noble
Format: NOOK Book
File size: 3 MB

About the Author

Earl Boebert wrote his first computer program in 1958 as an undergraduate at Stanford. In 1961 he and another student automated the halftime card stunts for football games, the earliest known application of computing to pixel graphics.
After graduating he became an Electronic Data Processing Officer in the United States Air Force, where he was awarded the Air Force Commendation Medal for his efforts in converting systems from assembly to high−level programming languages.
He then joined Honeywell, where he engaged in new systems development, managed a group that produced security enhancements for the Multics system, and engaged in the design and verification of software for the Saab JA37B, the Mark 48 torpedo, and the Space Shuttle main engine controller. He led the engineering of several advanced electronic security systems, rose to the grade of Senior Research Fellow and won Honeywell's highest award for technical achievement. His course on systems engineering and project management was given to over 3,000 students in 13 countries.
He then became technical founder and Chief Scientist of Secure Computing Corporation where he led the creation of the Sidewinder security server and other security products.
His final position before retirement was as a Senior Scientist for Sandia National Laboratories, where he engaged in a variety of high technology projects.
He is the holder or co-holder of 13 patents in computer and communications security.
He has served on National Research Council committees that produced the following reports:
1991: Computers at Risk: Computing in the Information Age
1997: For the Record: Protecting Electronic Health Information
1999: Trust in Cyberspace
2003: Information Technology for Counterterrorism: Immediate Actions and Future Possibilities
2004: A Review of the FBI´s Trilogy Information Technology Modernization Program
2008: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
2010: Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
2010: Risk-Based Approaches for Securing the DOE Nuclear Weapons Complex.
He also participated in the workshops "Cyber-Attack" and "Insider Threat" and has acted as a reviewer for many National Research Council reports.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews