HANDBOOK OF INFORMATION SECURITY Threats, Vulnerabilities, Prevention,Detection, and Management Volume 3

1.2K 2.7K 1
HANDBOOK OF INFORMATION SECURITY Threats, Vulnerabilities, Prevention,Detection, and Management Volume 3

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... Char Count= 0 Preface The Handbook of Information Security is the first comprehensive examination of the core topics in the security field The Handbook of Information Security, a 3 -volume reference work with 207 chapters and 33 00+ pages, is a comprehensive coverage of information, computer, and network security The primary audience is the libraries of 2-year and 4-year colleges and universities with computer... information, on computer security topics, practical applications and coverage of the emerging issues in the information security field This definitive 3 -volume handbook offers coverage of both established and cutting-edge theories and developments in information, computer, and network security This handbook contains chapters by global academic and industry experts This handbook offers the following features:... coverage of the relatively new and very important field of information, computer, and network security This reference work consists of three separate volumes and 207 different chapters on various aspects of this field Each chapter in the handbook provides a comprehensive overview of the selected topic, intended to inform a broad spectrum of readers, ranging from computer and security professionals and academicians... Contributors Preface Guide to the Handbook of Information Security Reviewers List Volume Index xv xxiii xxvi 1051 1059 Online Retail Banking: Security Breaches, and Controls Kent Belasco and Siaw-Peng Wan 15 Concerns, Digital Libraries: Security and Preservation Considerations Cavan McCarthy 37 49 226 242 254 E-Education and Information Privacy and Security William K Jackson 3 Business-to-Business Electronic... Michael R Anderson Volume III: Threats, Vulnerabilities, Prevention, Detection, and Management Part 2: Prevention: Keeping the Hackers and Crackers at Bay Physical Security Measures Mark Michael 2 63 RFID and Security Stephen A Weis Part 1: Threats and Vulnerabilities to Information and Computing Infrastructures 289 Cryptographic Privacy Protection Techniques Markus Jakobsson 30 0 Internal Security Threats... The handbook provides unmatched coverage of fundamental topics and issues for successful design and implementation of a sound security program Its chapters can serve as material for a wide spectrum of courses such as: Information and Network Security Information Privacy Social Engineering Secure Financial Transactions Information Warfare Infrastructure for Secure Information Transfer Standards and. .. 101 Information Assurance Peng Liu, Meng Yu, and Jiwu Jing 110 Part 2: Social and Legal Issues The Legal Implications of Information Security: Regulatory Compliance and Liability Blaze D Waleski 127 Hackers, Crackers, and Computer Criminals David Dittrich and Kenneth Einar Himma 154 Hacktivism Paul A Taylor and Jan Ll Harris 172 Part 3: Foundations of Information, Computer and Network Security 1 83 Encryption... Krishnamurthy 1007 P3P (Platform for Privacy Preferences Project) Lorrie Faith Cranor 10 23 Volume II: Information Warfare; Social, Legal, and International Issues; and Security Foundations Wireless Internet: A Cellular Perspective Abbas Jamalipour 732 Security of Satellite Networks Michele Luglio and Antonio Saitto 754 Cybercrime and the U.S Criminal Justice System Susan W Brenner Security of Broadband Access... Privacy Law and the Internet Ray Everett-Church 33 6 Key Lengths Arjen K Lenstra 617 Internet Censorship Richard A Spinello 34 9 Key Management Xukai Zou and Amandeep Thukral 636 Copyright Law Randy Canis 35 7 Secure Electronic Voting Protocols Helger Lipmaa 647 Patent Law Gerald Bluhm 36 9 Digital Evidence Robin C Stuart 658 Law Enforcement and Computer Security Threats and Measures Mathieu Deflem and J Eagle... processing, and business departments; public, private, and corporate libraries throughout the world; and reference material for educators and practitioners in the information and computer security fields The secondary audience is a variety of professionals and a diverse group of academic and professional course instructors Among the industries expected to become increasingly dependent upon information and computer . 978-0-471-64 830 -7, ISBN-10: 0-471-64 830 -2 (CLOTH VOL1 :alk. paper) ISBN- 13: 978-0-471-64 831 -4, ISBN-10: 0-471-64 831 -0 (CLOTH VOL2 :alk. paper) ISBN- 13: 978-0-471-64 832 -1, ISBN-10: 0-471-64 832 -9 (CLOTH VOL3 :alk GDZ JWBS001-FM -Vol. III WL041/Bidgolio -Vol I WL041-Sample-v1.cls November 11, 2005 5:9 Char Count= 0 HANDBOOK OF INFORMATION SECURITY Threats, Vulnerabilities, Prevention, Detection, and Management Volume 3 Hossein. Communications Media 33 7 Thomas L. Pigg Routers and Switches 35 0 Hans-Peter Dommel Radio Frequency and Wireless Communications Security 36 3 Okechukwu Ugweje Wireless Channels 38 7 P. M. Shankar Security in

Ngày đăng: 17/10/2014, 17:05

Từ khóa liên quan

Mục lục

  • HANDBOOK OF INFORMATION SECURITY: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3

    • Contents

    • Preface

    • Guide to The Handbook of Information Security

    • PART 1: Threats and Vulnerabilities to Information and Computing Infrastructures

      • Internal Security Threats

        • INTRODUCTION

        • EXTENT OF THE PROBLEM

        • CHARACTERISTICS AND MOTIVATIONS

        • INSIDER TYPOLOGY

        • FACTORS AND CAUSES

        • MITIGATION

        • CONCLUSION

        • GLOSSARY

        • CROSS REFERENCES

        • REFERENCES

        • Physical Security Threats

          • INTRODUCTION

          • FUNDAMENTAL THREATS TO SUSTAINING INFORMATION

          • DISASTERS AND THE THREATS THEY BRING

          • PHYSICAL MEANS OF MISAPPROPRIATING RESOURCES

          • CONCLUSION

          • GLOSSARY

          • CROSS REFERENCES

Tài liệu cùng người dùng

Tài liệu liên quan