Handbook of information security 1 Key concepts, infrastructure, standards and protocols

Gespeichert in:
Bibliographische Detailangaben
Format: Buch
Sprache:English
Veröffentlicht: Hoboken, NJ Wiley 2006
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cc4500
001 BV021539155
003 DE-604
005 20060418
007 t|
008 060404s2006 xx ad|| |||| 00||| eng d
020 |a 0471648302  |9 0-471-64830-2 
020 |a 9780471648307  |9 978-0-471-64830-7 
035 |a (OCoLC)179989618 
035 |a (DE-599)BVBBV021539155 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-573  |a DE-384  |a DE-1051  |a DE-1102  |a DE-355  |a DE-634  |a DE-522  |a DE-188 
082 0 |a 005.8 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
245 1 0 |a Handbook of information security  |n 1  |p Key concepts, infrastructure, standards and protocols  |c Hossein Bidgoli, Ed. 
264 1 |a Hoboken, NJ  |b Wiley  |c 2006 
300 |a XXVII, 1092 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
700 1 |a Bidgoli, Hossein  |e Sonstige  |4 oth 
773 0 8 |w (DE-604)BV021539143  |g 1 
856 4 2 |m Digitalisierung UB Regensburg  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014755383&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-014755383 

Datensatz im Suchindex

DE-BY-UBR_call_number 40/ST 276 B585
DE-BY-UBR_katkey 3780299
DE-BY-UBR_location 40
DE-BY-UBR_media_number 069034190169
_version_ 1822699019665670144
adam_text Contributors Preface Guide to the Handbook of Information Security Reviewers List Volume Index Volume I: Key Concepts, Infrastructure, Standards, and Protocols Part Related to Information Security Internet Basics Hossein Bidgoli Digital Economy Nirvikar Singh Online Retail Banking: Security Concerns, Breaches, and Controls Kent Belasco and Siaw-Peng Wan Digital Libraries: Security and Preservation Considerations Cavan E-Mail and Instant Messaging Bhagyavati Internet Relay Chat Paul L. Witt Online Communities Lee Sproull Groupware: Risks, Threats, and Vulnerabilities in the Internet Age Pierre Balthazard and John Warren Search Engines: Security, Privacy, and Ethical Issues Raymond Web Services Akhil Sahai, Electronic Commerce Charles EDI Security Matthew K. McGowan Electronic Payment Systems Indrajit Ray Intranets: Principals, Privacy, and Security Considerations William T. Extranets: and Privacy Stephen W. Thorpe Business-to-Business Electronic Commerce Julian J. Ray Click-and-Brick Electronic Commerce Charles Steinfield Mobile Commerce Vijay Atluri E-Education and Information Privacy and Security William K. Jackson Security in E-Learning Edgar R. Weippl E-Government Shannon Schelin and G. David Garson E-Government Security Issues and Measures William International Security Issues of E-Government Karin Geiselhart Part Computer Networks, and Secure Information Transfer Conducted Communications Media Thomas L. Pigg Routers and Switches Hans-Peter Dommel Radio Frequency and Wireless Communications Security Okechukwu Ugweje Wireless Channels P. M. Shankar Security in Circuit, Message, and Packet Switching Robert H. Greenfield and Daryle P. Digital Communication Robert W. Heath Jr., William Bard, and Atul A. Local Area Networks Wayne Wide Area and Metropolitan Area Networks Lynn A. DeNoia Home Area Networking Sherali Zeadally, Priya Kubher, and Nadeem Ansari ix Contents Public Network Technologies Dale Client/Server Computing: Principles and Security Considerations Daniel]. McFarland Peer-to-Peer Security Allan Friedman and L. Jean Camp Security Middleware Linda Volonino and Richard P. Volonino Internet Architecture Graham Knight ТСРЛР Prabliaker Mateti Voice-over Internet Protocol (VoIP) Rov Security and Web Quality of Service Tarek Mobile Devices and Protocols Min Song Bluetooth Technology Brent A. Miller Wireless Local Area Networks M. S. Obaidat, G. I. Papadimitriou, and S. Obeidat Security in Wireless Sensor Networks Mohamed and Asiiraj Wadaa Cellular Networks Jingynan Zhang and ¡van Stojmenovic Mobile IP M. Farooque Mesiya IP Multicast and Its Security Emilia Rosti TCP over Wireless Links Molisen Guizani and Air Interface Requirements for Mobile Data Services Harald Haas Wireless Internet: A Cellular Perspective Abbas Jamalipour Security of Satellite Networks Michele Luglio Security of Broadband Access Networks Peter L. Ad Hoc Network Security Pietro Michiardi Part for Secure Information Transfer Standards for Product Security Assessment István Digital Albert Internet Robert PKI (Public Radia S/MIME Steven PGP Stephen SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov Internet Security Standards Raymond R. Kerberos 920 William Stallings IPsec: A. Meddeb, IPsec: Charlie Kaufman Secure Sockets Layer (SSL) Robert PKCS (Public Key Cryptography Standards) Yongge Wang Public Key Standards: Secure Shell Xukai Security and the Wireless Application Protocol Lillian Wireless Network Standards and Protocol Prashant Krishnamurthy P3P (Platform for Privacy Preferences Project) Lome Faith Cranor Volume II: Information Warfare; Social, Legal, and International Issues; and Security Foundations Part Cybercrime and the U.S. Criminal Justice System Susan Cyberterrorism and Information Security Charles Jaeger Online Stalking David J. Loundv Contents xi Electronic Attacks Thomas M. Chen, Wireless Information Warfare Randall K. Nichols Computer Network Operations (CNO) Andrew Blyth Electronic Protection Neil Information Assurance Peng Liu, Part The Legal Implications of Information Security: Regulatory Compliance and Liability Blaze D. Waleski Hackers, Crackers, and Computer Criminals David Dittrich and Kenneth Hacktivism Paul A. Taylor and Jan Ll. Harris Corporate Spying: The Legal Aspects William A. Law Enforcement and Computer Security Threats and Measures Mathieu Combating the Cybercrime Threat: Developments in Global Law Enforcement Roderic Broadhurst Digital Identity Drummond Digital Divide Jaime J. Legal, Social, and Ethical Issues of the Internet Kenneth Anonymity and Identity on the Internet Jonathan Wallace Spam and the Legal Counter Attacks Charles Jaeger Cyberlaw: The Major Areas, Development, and Information Security Aspects Dennis M. Powers Global Aspects of Cyberlaw Julia Alpert Gladstone Privacy Law and the Internet Ray Everett-Church Internet Censorship Richard Copyright Law Randy Canis Patent Law Gerald Bluhm Trademark Law and the Internet Ray Everett-Church Online Contracts G. E. Evans Electronic Speech Seth Finkelstein Software Piracy Robert K. Moniot Internet Gambling Susanna Frederick Fischer The Digital Millennium Copyright Act Seth Finkelstein Digital Courts, the Law and Evidence Robert Part Computer and Network Security Encryption Basics Ari Juels Symmetric Key Encryption Jonathan Katz Data Encryption Standard Mike Speciner The Advanced Encryption Standard Duncan A. Buell Hashes and Message Digests Magnus Number Theory for Information Security Duncan A. Buell Public Key Algorithms Bradley S. Rubin Elliptic Curve Cryptography N. IBE (Identity-Based Encryption) Craig Gentry Cryptographic Protocols Markus Jakobsson Quantum Cryptography G. Massimo Key Lengths Arjen K. Lenstra Key Management Xukai Secure Electronic Voting Protocols Helger Lipmaa Digital Evidence Robin xii Contents Digital Watermarking and Steganography M. A. Suhail, B. Sadoun, and M. S. Obaidat Law Enforcement and Digital Evidence J. Philip Craiger, JeffSwauger, and Mark Forensic Computing Mohamed and Computer Forensics Procedures and Methods J. Philip Craiger Computer Forensics in Classified Government Agencies Michael R. Anderson Forensic Analysis of UNIX Systems Dario Forensic Analysis of Windows Systems Sieve J. Chapin and Chester J. Maciag Operating System Security William Stallings UNIX Security Mark Shacklette Linux Security A. Justin Wilder OpenVMS Robert Gezelter Windows E. Software Development and Quality Assurance Pascal The Common Criteria J. McDermott Volume III: Threats, Vulnerabilities, Prevention, Detection, and Management Part to Information and Computing Infrastructures Internal Security Threats Marcus K. Rogers Physical Security Threats Mark Michael Fixed-Line Telephone System Vulnerabilities Mak E-Mail Threats and Vulnerabilities David Harley E-Commerce Vulnerabilities Sviatoslav Braynov Hacking Techniques in Wired Networks Qijiin Gu, Peng Liu, and Chao-Hsien Hacking Techniques in Wireless Networks Prabhaker Mateti Computer Viruses and Worms Robert Trojan Horse Programs Adam L. Young Hoax Viruses and Virus Alerts Robert Hostile Java Applets David Evans Spyware Tom S. Chan Mobile Code and Security Song Wireless Threats and Attacks Robert J. Boncella WEP Security Nikita Borisov Bluetooth Security Susanne Cracking WEP Pascal Denial of Service Attacks E. Eugene Network Attacks Edward Amoroso Fault Attacks Hamid Choukri Side-Channel Attacks Pankaj Rohatgi Part Hackers and Crackers at Bay Physical Security Measures Mark Michael RFID and Security Stephen A. Cryptographic Privacy Protection Techniques Markus Jakobsson Cryptographic Hardware Security Modules Nicko Smart Card Security Michael Tunstall, Client-Side Security Charles Border Server-Side Security Slim Rekhis, Noureddine Boudriga, and Protecting Web Sites Dawn Alexander and April Giles Contents xiii Database Security Michael Medical Records Security Normand M. Martel Access Control: Principles and Solutions S. and Password Authentication Jeremy L. Computer and Network Authentication Patrick McDaniel Antivirus Matthew Biometrie James L. Wayman Issues and Concerns in Philip Statham Firewall Basics James E. Goldman Firewall Architectures James E. Goldman Packet Filtering and Stateful Firewalls Avishai Wool Proxy Firewalls John D. McLaren E-Commerce Safeguards Mark S. Merkow Digital Signatures and Electronic Signatures Raymond R. Panko E-Mail Security Jon Callas Security for ATM Networks Thomas D. Tarman VPN Basics G. I. Papadimitriou, M. S. Obaidat, and A. S. Pomportsis VPN Architecture Stan Kurkovsky IP-Based VPN David E. McDysan Identity Management John Linn The Use of Deception Techniques: Honeypots and Decoys Fred Cohen Active Response to Computer Intrusions David Dittrich and Kenneth Part Management, and Policy Considerations Intrusion Detection Systems Basics Peng Ning and Sushil Jajodia Host-Based Intrusion Detection System Giovanni Network-Based Intrusion Detection Systems Marco Cremonini The Use of Agent Technology for Intrusion Detection Dipankar Dasgupta Contingency Planning Management Marco Cremonini and Computer Security Incident Response Teams (CSIRTs) Raymond R. Panko Implementing a Security Awareness Program K. Rudolph Risk Management for IT Security Rick Kazman, Daniel Security Insurance and Best Practices Selahattin Auditing Information Systems Security S. Rao Vallabhaneni Evidence Collection and Analysis Tools Christopher L. T. Brown Information Leakage: Detection and Countermeasures Phil Digital Rights Management Renato Web Hosting Doug Kaye Managing a Network Environment Jian Ren E-Mail and Internet Use Policies Nancy J. King Forward Security Adaptive Cryptography: Time Evolution Gene Itkis Security Policy Guidelines Mohamed and Asset-Security Goals Continuum: A Process for Security Margarita Maria Multilevel Security Richard E. Smith xiv Contents Multilevel Security Mark Stamp and Security Architectures Nicole Graf and Dominic Kneeshaw Quality of Security Service: Adaptive Security Timothy E. Levin, Cynthia E. Irvine, and Evdoxia Spyropoulou
any_adam_object 1
building Verbundindex
bvnumber BV021539155
classification_rvk ST 277
ctrlnum (OCoLC)179989618
(DE-599)BVBBV021539155
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01241nam a2200313 cc4500</leader><controlfield tag="001">BV021539155</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060418 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">060404s2006 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471648302</subfield><subfield code="9">0-471-64830-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471648307</subfield><subfield code="9">978-0-471-64830-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)179989618</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021539155</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of information security</subfield><subfield code="n">1</subfield><subfield code="p">Key concepts, infrastructure, standards and protocols</subfield><subfield code="c">Hossein Bidgoli, Ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVII, 1092 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bidgoli, Hossein</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV021539143</subfield><subfield code="g">1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=014755383&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014755383</subfield></datafield></record></collection>
id DE-604.BV021539155
illustrated Illustrated
indexdate 2024-12-23T19:17:58Z
institution BVB
isbn 0471648302
9780471648307
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-014755383
oclc_num 179989618
open_access_boolean
owner DE-573
DE-384
DE-1051
DE-1102
DE-355
DE-BY-UBR
DE-634
DE-522
DE-188
owner_facet DE-573
DE-384
DE-1051
DE-1102
DE-355
DE-BY-UBR
DE-634
DE-522
DE-188
physical XXVII, 1092 S. Ill., graph. Darst.
publishDate 2006
publishDateSearch 2006
publishDateSort 2006
publisher Wiley
record_format marc
spellingShingle Handbook of information security
title Handbook of information security
title_auth Handbook of information security
title_exact_search Handbook of information security
title_full Handbook of information security 1 Key concepts, infrastructure, standards and protocols Hossein Bidgoli, Ed.
title_fullStr Handbook of information security 1 Key concepts, infrastructure, standards and protocols Hossein Bidgoli, Ed.
title_full_unstemmed Handbook of information security 1 Key concepts, infrastructure, standards and protocols Hossein Bidgoli, Ed.
title_short Handbook of information security
title_sort handbook of information security key concepts infrastructure standards and protocols
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014755383&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV021539143
work_keys_str_mv AT bidgolihossein handbookofinformationsecurity1