Handbook of information security 1 Key concepts, infrastructure, standards and protocols
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2006
|
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cc4500 | ||
---|---|---|---|
001 | BV021539155 | ||
003 | DE-604 | ||
005 | 20060418 | ||
007 | t| | ||
008 | 060404s2006 xx ad|| |||| 00||| eng d | ||
020 | |a 0471648302 |9 0-471-64830-2 | ||
020 | |a 9780471648307 |9 978-0-471-64830-7 | ||
035 | |a (OCoLC)179989618 | ||
035 | |a (DE-599)BVBBV021539155 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-384 |a DE-1051 |a DE-1102 |a DE-355 |a DE-634 |a DE-522 |a DE-188 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Handbook of information security |n 1 |p Key concepts, infrastructure, standards and protocols |c Hossein Bidgoli, Ed. |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2006 | |
300 | |a XXVII, 1092 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
700 | 1 | |a Bidgoli, Hossein |e Sonstige |4 oth | |
773 | 0 | 8 | |w (DE-604)BV021539143 |g 1 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014755383&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-014755383 |
Datensatz im Suchindex
DE-BY-UBR_call_number | 40/ST 276 B585 |
---|---|
DE-BY-UBR_katkey | 3780299 |
DE-BY-UBR_location | 40 |
DE-BY-UBR_media_number | 069034190169 |
_version_ | 1822699019665670144 |
adam_text | Contributors
Preface
Guide to the Handbook of Information Security
Reviewers List
Volume Index
Volume I: Key Concepts,
Infrastructure, Standards,
and Protocols
Part
Related to Information Security
Internet Basics
Hossein Bidgoli
Digital Economy
Nirvikar Singh
Online Retail Banking: Security Concerns,
Breaches, and Controls
Kent Belasco and Siaw-Peng Wan
Digital Libraries: Security and Preservation
Considerations
Cavan
E-Mail and Instant Messaging
Bhagyavati
Internet Relay Chat
Paul L. Witt
Online Communities
Lee Sproull
Groupware: Risks, Threats, and Vulnerabilities
in the Internet Age
Pierre Balthazard and John Warren
Search Engines: Security, Privacy, and
Ethical Issues
Raymond
Web Services
Akhil Sahai,
Electronic Commerce
Charles
EDI Security
Matthew K. McGowan
Electronic Payment Systems
Indrajit Ray
Intranets: Principals, Privacy, and Security
Considerations
William T.
Extranets:
and Privacy
Stephen W. Thorpe
Business-to-Business Electronic Commerce
Julian J. Ray
Click-and-Brick Electronic Commerce
Charles Steinfield
Mobile Commerce
Vijay Atluri
E-Education and Information Privacy and Security
William K. Jackson
Security in E-Learning
Edgar R. Weippl
E-Government
Shannon Schelin and G. David Garson
E-Government Security Issues and Measures
William
International Security Issues of E-Government
Karin Geiselhart
Part
Computer Networks, and Secure
Information Transfer
Conducted Communications Media
Thomas L. Pigg
Routers and Switches
Hans-Peter Dommel
Radio Frequency and Wireless Communications
Security
Okechukwu Ugweje
Wireless Channels
P. M. Shankar
Security in Circuit, Message, and Packet Switching
Robert H. Greenfield and Daryle P.
Digital Communication
Robert W. Heath Jr., William Bard, and Atul A.
Local Area Networks
Wayne
Wide Area and Metropolitan Area Networks
Lynn A. DeNoia
Home Area Networking
Sherali Zeadally, Priya Kubher, and Nadeem Ansari
ix
Contents
Public Network Technologies
Dale
Client/Server Computing: Principles and Security
Considerations
Daniel]. McFarland
Peer-to-Peer Security
Allan Friedman and L. Jean Camp
Security Middleware
Linda Volonino and Richard P. Volonino
Internet Architecture
Graham Knight
ТСРЛР
Prabliaker Mateti
Voice-over Internet Protocol (VoIP)
Rov
Security and Web Quality of Service
Tarek
Mobile Devices and Protocols
Min Song
Bluetooth Technology
Brent A. Miller
Wireless Local Area Networks
M. S. Obaidat, G. I. Papadimitriou,
and S. Obeidat
Security in Wireless Sensor Networks
Mohamed
and Asiiraj Wadaa
Cellular Networks
Jingynan Zhang and ¡van Stojmenovic
Mobile IP
M. Farooque Mesiya
IP Multicast and Its Security
Emilia Rosti
TCP over Wireless Links
Molisen Guizani and
Air Interface Requirements for Mobile Data
Services
Harald Haas
Wireless Internet: A Cellular Perspective
Abbas Jamalipour
Security of Satellite Networks
Michele Luglio
Security of Broadband Access Networks
Peter L.
Ad Hoc Network Security
Pietro Michiardi
Part
for Secure Information Transfer
Standards for Product Security Assessment
István
Digital
Albert
Internet
Robert
PKI (Public
Radia
S/MIME
Steven
PGP
Stephen
SMTP (Simple Mail Transfer Protocol)
Vladimir V. Riabov
Internet Security Standards
Raymond R.
Kerberos 920
William Stallings
IPsec:
A. Meddeb,
IPsec:
Charlie Kaufman
Secure Sockets Layer (SSL)
Robert
PKCS (Public Key Cryptography Standards)
Yongge Wang
Public Key Standards: Secure Shell
Xukai
Security and the Wireless Application Protocol
Lillian
Wireless Network Standards and Protocol
Prashant Krishnamurthy
P3P (Platform for Privacy Preferences Project)
Lome Faith Cranor
Volume II: Information Warfare;
Social, Legal, and International
Issues; and Security Foundations
Part
Cybercrime and the U.S. Criminal Justice System
Susan
Cyberterrorism and Information Security
Charles Jaeger
Online Stalking
David J. Loundv
Contents
xi
Electronic Attacks
Thomas M. Chen,
Wireless Information Warfare
Randall K. Nichols
Computer Network Operations (CNO)
Andrew Blyth
Electronic Protection
Neil
Information Assurance
Peng Liu,
Part
The Legal Implications of Information Security:
Regulatory Compliance and Liability
Blaze D. Waleski
Hackers, Crackers, and Computer Criminals
David Dittrich and Kenneth
Hacktivism
Paul A. Taylor and Jan Ll. Harris
Corporate Spying: The Legal Aspects
William A.
Law Enforcement and Computer Security Threats
and Measures
Mathieu
Combating the Cybercrime Threat: Developments
in Global Law Enforcement
Roderic Broadhurst
Digital Identity
Drummond
Digital Divide
Jaime J.
Legal, Social, and Ethical Issues of the Internet
Kenneth
Anonymity and Identity on the Internet
Jonathan Wallace
Spam and the Legal Counter Attacks
Charles Jaeger
Cyberlaw: The Major Areas, Development,
and Information Security Aspects
Dennis M. Powers
Global Aspects of Cyberlaw
Julia Alpert Gladstone
Privacy Law and the Internet
Ray Everett-Church
Internet Censorship
Richard
Copyright Law
Randy Canis
Patent Law
Gerald Bluhm
Trademark Law and the Internet
Ray Everett-Church
Online Contracts
G. E. Evans
Electronic Speech
Seth Finkelstein
Software Piracy
Robert K. Moniot
Internet Gambling
Susanna Frederick Fischer
The Digital Millennium Copyright Act
Seth Finkelstein
Digital Courts, the Law and Evidence
Robert
Part
Computer and Network Security
Encryption Basics
Ari Juels
Symmetric Key Encryption
Jonathan Katz
Data Encryption Standard
Mike Speciner
The Advanced Encryption Standard
Duncan A. Buell
Hashes and Message Digests
Magnus
Number Theory for Information Security
Duncan A. Buell
Public Key Algorithms
Bradley S. Rubin
Elliptic Curve Cryptography
N.
IBE (Identity-Based Encryption)
Craig Gentry
Cryptographic Protocols
Markus Jakobsson
Quantum Cryptography
G. Massimo
Key Lengths
Arjen K. Lenstra
Key Management
Xukai
Secure Electronic Voting Protocols
Helger Lipmaa
Digital Evidence
Robin
xii
Contents
Digital Watermarking and Steganography
M. A. Suhail, B. Sadoun, and M. S. Obaidat
Law Enforcement and Digital Evidence
J. Philip Craiger, JeffSwauger, and Mark
Forensic Computing
Mohamed
and
Computer Forensics Procedures and Methods
J. Philip Craiger
Computer Forensics
in Classified Government Agencies
Michael R. Anderson
Forensic Analysis of UNIX Systems
Dario
Forensic Analysis of Windows Systems
Sieve J. Chapin and Chester J. Maciag
Operating System Security
William Stallings
UNIX Security
Mark Shacklette
Linux Security
A. Justin Wilder
OpenVMS
Robert Gezelter
Windows
E.
Software Development and Quality Assurance
Pascal
The Common Criteria
J. McDermott
Volume III: Threats, Vulnerabilities,
Prevention, Detection, and
Management
Part
to Information and Computing
Infrastructures
Internal Security Threats
Marcus K. Rogers
Physical Security Threats
Mark Michael
Fixed-Line Telephone System Vulnerabilities
Mak
E-Mail Threats and Vulnerabilities
David Harley
E-Commerce Vulnerabilities
Sviatoslav Braynov
Hacking Techniques in Wired Networks
Qijiin Gu, Peng Liu, and Chao-Hsien
Hacking Techniques in Wireless Networks
Prabhaker Mateti
Computer Viruses and Worms
Robert
Trojan Horse Programs
Adam L. Young
Hoax Viruses and Virus Alerts
Robert
Hostile Java Applets
David Evans
Spyware
Tom S. Chan
Mobile Code and Security
Song
Wireless Threats and Attacks
Robert J. Boncella
WEP Security
Nikita Borisov
Bluetooth Security
Susanne
Cracking WEP
Pascal
Denial of Service Attacks
E. Eugene
Network Attacks
Edward Amoroso
Fault Attacks
Hamid Choukri
Side-Channel Attacks
Pankaj Rohatgi
Part
Hackers and Crackers at Bay
Physical Security Measures
Mark Michael
RFID and Security
Stephen A.
Cryptographic Privacy Protection Techniques
Markus Jakobsson
Cryptographic Hardware Security Modules
Nicko
Smart Card Security
Michael Tunstall,
Client-Side Security
Charles Border
Server-Side Security
Slim Rekhis, Noureddine Boudriga, and
Protecting Web Sites
Dawn Alexander and April Giles
Contents
xiii
Database Security
Michael
Medical Records Security
Normand M. Martel
Access Control: Principles and Solutions
S.
and
Password Authentication
Jeremy L.
Computer and Network Authentication
Patrick McDaniel
Antivirus
Matthew
Biometrie
James L. Wayman
Issues and Concerns in
Philip Statham
Firewall Basics
James E. Goldman
Firewall Architectures
James E. Goldman
Packet Filtering and Stateful Firewalls
Avishai Wool
Proxy Firewalls
John D. McLaren
E-Commerce Safeguards
Mark S. Merkow
Digital Signatures and Electronic Signatures
Raymond R. Panko
E-Mail Security
Jon Callas
Security for ATM Networks
Thomas D. Tarman
VPN Basics
G. I. Papadimitriou, M. S. Obaidat,
and A. S. Pomportsis
VPN Architecture
Stan Kurkovsky
IP-Based VPN
David E. McDysan
Identity Management
John Linn
The Use of Deception Techniques: Honeypots
and Decoys
Fred Cohen
Active Response to Computer Intrusions
David Dittrich and Kenneth
Part
Management, and Policy Considerations
Intrusion Detection Systems Basics
Peng Ning and Sushil Jajodia
Host-Based Intrusion Detection System
Giovanni
Network-Based Intrusion Detection Systems
Marco Cremonini
The Use of Agent Technology for Intrusion
Detection
Dipankar Dasgupta
Contingency Planning Management
Marco Cremonini and
Computer Security Incident Response
Teams (CSIRTs)
Raymond R. Panko
Implementing a Security Awareness Program
K. Rudolph
Risk Management for IT Security
Rick Kazman, Daniel
Security Insurance and Best Practices
Selahattin
Auditing Information Systems Security
S. Rao Vallabhaneni
Evidence Collection and Analysis Tools
Christopher L. T. Brown
Information Leakage: Detection and
Countermeasures
Phil
Digital Rights Management
Renato
Web Hosting
Doug Kaye
Managing a Network Environment
Jian Ren
E-Mail and Internet Use Policies
Nancy J. King
Forward Security Adaptive Cryptography:
Time Evolution
Gene Itkis
Security Policy Guidelines
Mohamed
and
Asset-Security Goals Continuum: A Process
for Security
Margarita Maria
Multilevel Security
Richard E. Smith
xiv Contents
Multilevel Security
Mark Stamp and
Security Architectures
Nicole Graf and Dominic Kneeshaw
Quality of Security Service: Adaptive Security
Timothy E. Levin, Cynthia E. Irvine, and Evdoxia
Spyropoulou
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV021539155 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)179989618 (DE-599)BVBBV021539155 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01241nam a2200313 cc4500</leader><controlfield tag="001">BV021539155</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060418 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">060404s2006 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471648302</subfield><subfield code="9">0-471-64830-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471648307</subfield><subfield code="9">978-0-471-64830-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)179989618</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021539155</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of information security</subfield><subfield code="n">1</subfield><subfield code="p">Key concepts, infrastructure, standards and protocols</subfield><subfield code="c">Hossein Bidgoli, Ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVII, 1092 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bidgoli, Hossein</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV021539143</subfield><subfield code="g">1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014755383&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014755383</subfield></datafield></record></collection> |
id | DE-604.BV021539155 |
illustrated | Illustrated |
indexdate | 2024-12-23T19:17:58Z |
institution | BVB |
isbn | 0471648302 9780471648307 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014755383 |
oclc_num | 179989618 |
open_access_boolean | |
owner | DE-573 DE-384 DE-1051 DE-1102 DE-355 DE-BY-UBR DE-634 DE-522 DE-188 |
owner_facet | DE-573 DE-384 DE-1051 DE-1102 DE-355 DE-BY-UBR DE-634 DE-522 DE-188 |
physical | XXVII, 1092 S. Ill., graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Wiley |
record_format | marc |
spellingShingle | Handbook of information security |
title | Handbook of information security |
title_auth | Handbook of information security |
title_exact_search | Handbook of information security |
title_full | Handbook of information security 1 Key concepts, infrastructure, standards and protocols Hossein Bidgoli, Ed. |
title_fullStr | Handbook of information security 1 Key concepts, infrastructure, standards and protocols Hossein Bidgoli, Ed. |
title_full_unstemmed | Handbook of information security 1 Key concepts, infrastructure, standards and protocols Hossein Bidgoli, Ed. |
title_short | Handbook of information security |
title_sort | handbook of information security key concepts infrastructure standards and protocols |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014755383&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV021539143 |
work_keys_str_mv | AT bidgolihossein handbookofinformationsecurity1 |