Handbook of Information Security, Volume I: Key Concepts, Infrastructure, Standards and Protocols

Handbook of Information Security, Volume I: Key Concepts, Infrastructure, Standards and Protocols $300.00
Three Volume Set $900.00
Handbook of Information Security, Volume I: Key Concepts, Infrastructure, Standards and Protocols

More than 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare


Hossein Bidgoli
Hardcover
1120 pages
January 2006

From the Publisher:
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The 3 Volumes contain over 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Key features:

  • The Handbook provides researchers and managers with a solid coverage of the core technologies and applications in the information security field.
  • Articles in the Handbook have been rigorously peer-reviewed by more than 1,000 experts chosen from around the world.
  • The 3 volumes include more than 200 articles from over 200 leading experts.

Table of Contents in Volume I Include:

Part 1: Key Concepts and Applications related to Information Security

  1. Internet Basics
  2. Digital Economy
  3. Online Retail Banking: Security Concerns, Breaches, and Controls
  4. Digital Libraries: Security and Preservation Considerations
  5. E-Mail and Instant Messaging
  6. Internet Relay Chat
  7. Online Communities
  8. Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
  9. Search Engines: Security, Privacy and Ethical Issues
  10. Web Services
  11. Electronic Commerce
  12. EDI Security
  13. Electronic Payment Systems
  14. Intranets: Principals, Privacy and Security Considerations
  15. Extranets: Applications, Development, Security and Privacy
  16. Business-to-Business Electronic Commerce
  17. Click-and-Brick Electronic Commerce
  18. Mobile Commerce
  19. E-education and Information
  20. Privacy and Security
  21. Security in E-Learning E-Government
  22. E-government Security Issues and Measures
  23. International Security Issues of E-Government

Part 2: Infrastructure for the Internet, Computer Networks and Secure Information Transfer

  1. Conducted Communications Media
  2. Routers and Switches
  3. Radio Frequency and Wireless Communications Security
  4. Wireless Channels
  5. Security in Circuit, Message, and Packet Switching
  6. Digital Communication
  7. Local Area Networks
  8. Wide Area and Metropolitan Area Networks
  9. Home Area Networking
  10. Public Network Technologies and Security
  11. Client/Server Computing: Principles and Security Considerations
  12. Peer-to-Peer Security
  13. Security Middleware
  14. Internet Architecture
  15. TCP/IP Suite
  16. Voice over Internet Protocol (VoIP)
  17. Security and Web Quality of Service
  18. Mobile Devices and Protocols
  19. Bluetooth Technology
  20. Wireless Local Area Networks
  21. Security in Wireless Sensor Networks
  22. Cellular Networks
  23. Mobile IP
  24. IP Multicast and its Security
  25. TCP over Wireless Links
  26. Air–Interface Requirements for Mobile Data Services
  27. Wireless Internet: A Cellular Perspective
  28. Security for Satellite Networks
  29. Security of Broadband Access Networks
  30. Ad hoc Network Security

Part 3: Standards and Protocols for Secure Information

  1. Transfer Standards for Product Security Assessment
  2. Digital Certificates
  3. Internet E-Mail Architecture
  4. PKI (Public Key Infrastructure)
  5. S/MIME (Secure MIME)
  6. PGP (Pretty Good Privacy)
  7. SMTP (Simple Mail Transfer Protocol)
  8. Internet Security Standards
  9. Kerberos
  10. IPsec: AH (Authentication Header) and ESP (Encapsulating Security Payload)
  11. IPsec: IKE (Internet Key Exchange)
  12. Secure Sockets Layer (SSL)
  13. PKCS (Public-Key Cryptography Standards)
  14. Secure Shell (SSH)
  15. Security and the Wireless Application Protocol (WAP)
  16. Wireless Network Standards and Protocol (802.11)
  17. P3P (Platform for Privacy Preferences Project)

About the Author: Hossein Bidgoli, Ph.D., is professor Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States. he is the author of 43 textbooks, 27 manuals and over five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor -in-chief of the Internet Encyclopedia and the Encyclopedia of Information Systems. The Encyclopedia of Information Systems.


This volume is part of a 3 volume set including Volume 1, Key Concepts, Infrastructure, Standards and Protocols, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations and Volume 3, Threats, Vulnerabilities, Prevention, Detection, and Management.


Handbook of Information Security - Three Volume Set Includes:

  • Volume I: Key Concepts, Infrastructure, Standards and Protocols;
  • Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations
  • Volume III: Threats, Vulnerabilities, Prevention, Detection and Management