The History of Information Security: A Comprehensive Handbook
Coopersmith reviews The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra.
Gespeichert in:
Veröffentlicht in: | Technology and Culture 2009, Vol.50 (1), p.262-263 |
---|---|
1. Verfasser: | |
Format: | Review |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 263 |
---|---|
container_issue | 1 |
container_start_page | 262 |
container_title | Technology and Culture |
container_volume | 50 |
creator | Coopersmith, Jonathan C. |
description | Coopersmith reviews The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra. |
doi_str_mv | 10.1353/tech.0.0193 |
format | Review |
fullrecord | <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_839136165</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>40061611</jstor_id><sourcerecordid>40061611</sourcerecordid><originalsourceid>FETCH-LOGICAL-c247t-de1bdc322319aee9558bc5a0d33a5e03228b7ddd88abff42dfda4d56b3a331be3</originalsourceid><addsrcrecordid>eNpdkM1LwzAYh4MoOD9OnoXixYN05m2SNhU8jOHHYOBhCt5C2rxlrWszk1bYf2_KRMFc3kOe3-9NHkIugE6BCXbbY7me0imFnB2QCdA8i1mW5IdkQimnMaTi_ZiceN_QcFKRTsj96xqj59r31u0iW0WLrrKu1X1tu2iF5eDqfncXzaK5bbcO19j5-isEdGcKaz_OyFGlNx7Pf-YpeXt8eJ0_x8uXp8V8tozLhGd9bBAKU7IkYZBrxFwIWZRCU8OYFkjDhSwyY4yUuqgqnpjKaG5EWjDNGBTITsn1vnfr7OeAvldt7UvcbHSHdvBKshxYGr4XyKt_ZGMH14XHKcglT3mSQYBu9lDprPcOK7V1davdTgFVo0g1ilRUjSIDzX8rGyz7dvD415oIKbhQq1H26JpKCG5BhtjlPtaMcn838CAeUgD2DUd2f_8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>review</recordtype><pqid>198464271</pqid></control><display><type>review</type><title>The History of Information Security: A Comprehensive Handbook</title><source>JSTOR Archive Collection A-Z Listing</source><creator>Coopersmith, Jonathan C.</creator><creatorcontrib>Coopersmith, Jonathan C.</creatorcontrib><description>Coopersmith reviews The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra.</description><identifier>ISSN: 0040-165X</identifier><identifier>ISSN: 1097-3729</identifier><identifier>EISSN: 1097-3729</identifier><identifier>DOI: 10.1353/tech.0.0193</identifier><identifier>CODEN: TECUA3</identifier><language>eng</language><publisher>Baltimore: Johns Hopkins University Press</publisher><subject>Bergstra, Jan ; Cryptography ; Cultural studies ; Cybercrime ; Data integrity ; Data protection ; de Leeuw, Karl ; Information ; New technology ; Nonfiction ; Science and technology ; Technological change</subject><ispartof>Technology and Culture, 2009, Vol.50 (1), p.262-263</ispartof><rights>Copyright 2009 The Society for the History of Technology</rights><rights>Copyright © 2009 The Society for the History of Technology.</rights><rights>Copyright Johns Hopkins University Press Jan 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/40061611$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/40061611$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,315,781,785,793,804,4025,27927,27928,27929,27930,58022,58255</link.rule.ids></links><search><creatorcontrib>Coopersmith, Jonathan C.</creatorcontrib><title>The History of Information Security: A Comprehensive Handbook</title><title>Technology and Culture</title><description>Coopersmith reviews The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra.</description><subject>Bergstra, Jan</subject><subject>Cryptography</subject><subject>Cultural studies</subject><subject>Cybercrime</subject><subject>Data integrity</subject><subject>Data protection</subject><subject>de Leeuw, Karl</subject><subject>Information</subject><subject>New technology</subject><subject>Nonfiction</subject><subject>Science and technology</subject><subject>Technological change</subject><issn>0040-165X</issn><issn>1097-3729</issn><issn>1097-3729</issn><fulltext>true</fulltext><rsrctype>review</rsrctype><creationdate>2009</creationdate><recordtype>review</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AIMQZ</sourceid><sourceid>AVQMV</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>K50</sourceid><sourceid>M1D</sourceid><sourceid>M2O</sourceid><recordid>eNpdkM1LwzAYh4MoOD9OnoXixYN05m2SNhU8jOHHYOBhCt5C2rxlrWszk1bYf2_KRMFc3kOe3-9NHkIugE6BCXbbY7me0imFnB2QCdA8i1mW5IdkQimnMaTi_ZiceN_QcFKRTsj96xqj59r31u0iW0WLrrKu1X1tu2iF5eDqfncXzaK5bbcO19j5-isEdGcKaz_OyFGlNx7Pf-YpeXt8eJ0_x8uXp8V8tozLhGd9bBAKU7IkYZBrxFwIWZRCU8OYFkjDhSwyY4yUuqgqnpjKaG5EWjDNGBTITsn1vnfr7OeAvldt7UvcbHSHdvBKshxYGr4XyKt_ZGMH14XHKcglT3mSQYBu9lDprPcOK7V1davdTgFVo0g1ilRUjSIDzX8rGyz7dvD415oIKbhQq1H26JpKCG5BhtjlPtaMcn838CAeUgD2DUd2f_8</recordid><startdate>20090101</startdate><enddate>20090101</enddate><creator>Coopersmith, Jonathan C.</creator><general>Johns Hopkins University Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>0-V</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8BJ</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>8XN</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AIMQZ</scope><scope>ALSLI</scope><scope>ARAPS</scope><scope>AVQMV</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FQK</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JBE</scope><scope>JQ2</scope><scope>K50</scope><scope>K6~</scope><scope>K7-</scope><scope>K9.</scope><scope>KB.</scope><scope>L.-</scope><scope>L6V</scope><scope>LIQON</scope><scope>M0C</scope><scope>M0S</scope><scope>M1D</scope><scope>M1P</scope><scope>M2O</scope><scope>M2P</scope><scope>M2R</scope><scope>M7S</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PDBOC</scope><scope>PQBIZ</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>R05</scope><scope>S0X</scope></search><sort><creationdate>20090101</creationdate><title>The History of Information Security: A Comprehensive Handbook</title><author>Coopersmith, Jonathan C.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c247t-de1bdc322319aee9558bc5a0d33a5e03228b7ddd88abff42dfda4d56b3a331be3</frbrgroupid><rsrctype>reviews</rsrctype><prefilter>reviews</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Bergstra, Jan</topic><topic>Cryptography</topic><topic>Cultural studies</topic><topic>Cybercrime</topic><topic>Data integrity</topic><topic>Data protection</topic><topic>de Leeuw, Karl</topic><topic>Information</topic><topic>New technology</topic><topic>Nonfiction</topic><topic>Science and technology</topic><topic>Technological change</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Coopersmith, Jonathan C.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>International Bibliography of Art (IBA)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest One Literature</collection><collection>Social Science Premium Collection</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>Arts Premium Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>International Bibliography of the Social Sciences</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Computer Science Collection</collection><collection>Access via Art, Design & Architecture Collection (ProQuest)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest One Literature - U.S. Customers Only</collection><collection>ABI/INFORM Global</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Arts & Humanities Database</collection><collection>Medical Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Social Science Database</collection><collection>Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Materials Science Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>University of Michigan</collection><collection>SIRS Editorial</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Coopersmith, Jonathan C.</au><format>journal</format><genre>article</genre><ristype>GEN</ristype><atitle>The History of Information Security: A Comprehensive Handbook</atitle><jtitle>Technology and Culture</jtitle><date>2009-01-01</date><risdate>2009</risdate><volume>50</volume><issue>1</issue><spage>262</spage><epage>263</epage><pages>262-263</pages><issn>0040-165X</issn><issn>1097-3729</issn><eissn>1097-3729</eissn><coden>TECUA3</coden><abstract>Coopersmith reviews The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra.</abstract><cop>Baltimore</cop><pub>Johns Hopkins University Press</pub><doi>10.1353/tech.0.0193</doi><tpages>2</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0040-165X |
ispartof | Technology and Culture, 2009, Vol.50 (1), p.262-263 |
issn | 0040-165X 1097-3729 1097-3729 |
language | eng |
recordid | cdi_proquest_miscellaneous_839136165 |
source | JSTOR Archive Collection A-Z Listing |
subjects | Bergstra, Jan Cryptography Cultural studies Cybercrime Data integrity Data protection de Leeuw, Karl Information New technology Nonfiction Science and technology Technological change |
title | The History of Information Security: A Comprehensive Handbook |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T22%3A40%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20History%20of%20Information%20Security:%20A%20Comprehensive%20Handbook&rft.jtitle=Technology%20and%20Culture&rft.au=Coopersmith,%20Jonathan%20C.&rft.date=2009-01-01&rft.volume=50&rft.issue=1&rft.spage=262&rft.epage=263&rft.pages=262-263&rft.issn=0040-165X&rft.eissn=1097-3729&rft.coden=TECUA3&rft_id=info:doi/10.1353/tech.0.0193&rft_dat=%3Cjstor_proqu%3E40061611%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=198464271&rft_id=info:pmid/&rft_jstor_id=40061611&rfr_iscdi=true |