HANDBOOK OF INFORMATION SECURITY Threats, Vulnerabilities, Prevention,Detection, and Management Volume 2

1K 1.3K 0
HANDBOOK OF INFORMATION SECURITY Threats, Vulnerabilities, Prevention,Detection, and Management Volume 2

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... biotechnology, retail, and utility Each volume incorporates state -of- the-art, core information, on computer security topics, practical applications and coverage of the emerging issues in the information security field This definitive 3 -volume handbook offers coverage of both established and cutting-edge theories and developments in information, computer, and network security This handbook contains chapters... November 11, 20 05 xxii 12: 47 Char Count= 0 P1: GDZ/SPH P2: GDZ/SPH JWBS001-FM-Vol.II QC: GDZ/SPH WL041/Bidgolio-Vol I T1: GDZ WL041-Sample-v1.cls November 11, 20 05 12: 47 Char Count= 0 Preface The Handbook of Information Security is the first comprehensive examination of the core topics in the security field The Handbook of Information Security, a 3 -volume reference work with 20 7 chapters and 3300+ pages,... coverage of the relatively new and very important field of information, computer, and network security This reference work consists of three separate volumes and 20 7 different chapters on various aspects of this field Each chapter in the handbook provides a comprehensive overview of the selected topic, intended to inform a broad spectrum of readers, ranging from computer and security professionals and academicians... McCarthy 37 49 22 6 24 2 25 4 E-Education and Information Privacy and Security William K Jackson 3 Business-to-Business Electronic Commerce Julian J Ray Mobile Commerce Vijay Atluri Part 1: Key Concepts and Applications Related to Information Security Digital Economy Nirvikar Singh 21 5 Click -and- Brick Electronic Commerce Charles Steinfield Volume I: Key Concepts, Infrastructure, Standards, and Protocols... Choukri and Michael Tunstall 23 0 The Common Criteria J McDermott 897 Side-Channel Attacks Pankaj Rohatgi 24 1 Computer Forensics—Computer Media Reviews in Classified Government Agencies Michael R Anderson Volume III: Threats, Vulnerabilities, Prevention, Detection, and Management Part 2: Prevention: Keeping the Hackers and Crackers at Bay Physical Security Measures Mark Michael 26 3 RFID and Security. .. and Security Considerations Daniel J McFarland 12: 47 Char Count= 0 CONTENTS 473 Part 3: Standards and Protocols for Secure Information Transfer Standards for Product Security Assessment ´ ´ ´ Istvan Zsolt Berta, Levente Buttyan, and Istvan Vajda 809 489 823 Peer-to-Peer Security Allan Friedman and L Jean Camp 501 Digital Certificates Albert Levi 5 12 Internet E-Mail Architecture Robert Gezelter 836 Security. .. comprehensive coverage of information, computer, and network security The primary audience is the libraries of 2- year and 4-year colleges and universities with computer science, MIS, CIS, IT, IS, data processing, and business departments; public, private, and corporate libraries throughout the world; and reference material for educators and practitioners in the information and computer security fields The... Reed and Jerry Kindall 22 3 Hashes and Message Digests Magnus Daum and Hans Dobbertin 510 Digital Divide Jaime J Davila 23 8 Number Theory for Information Security Duncan A Buell 5 32 Legal, Social, and Ethical Issues of the Internet Kenneth Einar Himma 24 7 Public Key Algorithms Bradley S Rubin 548 Anonymity and Identity on the Internet Jonathan Wallace 26 5 Elliptic Curve Cryptography N P Smart 558 Spam and. .. business worlds To develop this handbook, we carefully reviewed current academic research in the security field from leading universities and research institutions around the world Computer and network security, information security and privacy, management information systems, network design and management, computer information systems (CIS), decision support systems (DSS), and electronic commence curriculums,... such as: Information and Network Security Information Privacy Social Engineering Secure Financial Transactions Information Warfare Infrastructure for Secure Information Transfer Standards and Protocols for Secure Information Transfer Network Design and Management Client/Server Computing E-commerce Successful design and implementation of a sound security program requires a thorough knowledge of several . paper) ISBN-13: 978-0-471 -22 201-9, ISBN-10: 0-471 -22 201-1 (CLOTH SET : alk. paper) 1. Internet–Encyclopedias. I. Bidgoli, Hossein. TK5105.875.I57I5466 20 03 004.67  8  03–dc21 20 021 555 52 Printed in the. P1: GDZ/SPH P2: GDZ/SPH QC: GDZ/SPH T1: GDZ JWBS001-FM -Vol. II WL041/Bidgolio -Vol I WL041-Sample-v1.cls November 11, 20 05 12: 47 Char Count= 0 HANDBOOK OF INFORMATION SECURITY Information Warfare;. University, Bakersfield’s 20 01 20 02 Professor of the Year. v P1: GDZ/SPH P2: GDZ/SPH QC: GDZ/SPH T1: GDZ JWBS001-FM -Vol. II WL041/Bidgolio -Vol I WL041-Sample-v1.cls November 11, 20 05 12: 47 Char Count=

Ngày đăng: 17/10/2014, 17:02

Từ khóa liên quan

Mục lục

  • HANDBOOK OF INFORMATION SECURITY: Information Warfare; Social, Legal, and International Issues; and Security Foundations,Volume 2

    • Contents

    • Preface

    • Guide to The Handbook of Information Security Guide to The Handbook of Information Security

    • PART 1: Information Warfare

      • Cybercrime and the U. S. Criminal Justice System

        • INTRODUCTION

        • DIFFERENCES FROM CIVIL JUSTICE SYSTEM

        • BASIC INSTITUTIONAL STRUCTURE

        • RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS

        • CRIMINAL JUSTICE SYSTEM AND CYBERCRIME

        • CONCLUSION

        • GLOSSARY

        • CROSS REFERENCES

        • REFERENCES

        • Cyberterrorism and Information Security

          • INTRODUCTION

          • DEFINING CYBERTERRORISM

          • HOW CYBERTERRORISM OCCURS

          • SPONSORS AND SUPPORT

          • CONTROLLING CYBERTERRORISM

          • WHO WILL WIN THE BATTLE OF CYBERTERRORISM?

          • GLOSSARY

          • CROSS REFERENCES

Tài liệu cùng người dùng

Tài liệu liên quan