Handbook of Information Security, Volume II, Information Warfare, Social, Legal, and International Issues and Security Foundations

Handbook of Information Security, Volume II, Information Warfare, Social, Legal, and International Issues and Security Foundations $300.00
Three Volume Set $900.00
Handbook of Information Security, Volume II, Information Warfare, Social, Legal, and International Issues and Security Foundations

More than 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare


Hossein Bidgoli
Hardcover
1008 pages
January 2006

From the Publisher:
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The 3 Volumes contain over 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Key features:

  • The Handbook provides researchers and managers with a solid coverage of the core technologies and applications in the information security field.
  • Articles in the Handbook have been rigorously peer-reviewed by more than 1,000 experts chosen from around the world.
  • The 3 volumes include more than 200 articles from over 200 leading experts.

Table of Contents for Volume II include:

Part 1: Information Warfare

  1. Cybercrime and the U.S. Criminal Justice System
  2. Cyberterrorism and Information Security
  3. Online Stalking
  4. Electronic Attacks
  5. Wireless Information Warfare
  6. Computer Network Operations (CNO)
  7. Electronic Protection
  8. Information Assurance

Part 2: Social, and Legal Issues

  1. The Legal Implications of Information Security: Regulatory Compliance and Liability
  2. Hackers, Crackers and Computer Criminals
  3. Hacktivism
  4. Corporate Spying: The Legal Aspects
  5. Law Enforcement and Computer Security Threats and Measures
  6. Combating the Cyber Crime Threat: Developments in Global Law Enforcement
  7. Digital Identity
  8. Digital Divide
  9. Legal, Social and Ethical Issues of the Internet
  10. Anonymity and Identity on the Internet
  11. Spam and the Legal Counter Attacks
  12. Cyberlaw: The Major Areas, Development, and Information Security Aspects
  13. Global Aspects of Cyberlaw
  14. Privacy Law and the Internet
  15. Internet Censorship
  16. Copyright Law
  17. Patent Law
  18. Trademark Law and the Internet
  19. Online Contracts
  20. Electronic Speech
  21. Software Piracy
  22. Internet Gambling
  23. The Digital Millennium Copyright Act
  24. Digital Courts, the Law and Evidence

Part 3: Foundations of Information, Computer and Network Security

  1. Encryption Basics
  2. Symmetric-Key Encryption
  3. Data Encryption Standard (DES)
  4. The Advanced Encryption Standard
  5. Hashes and Message Digests
  6. Number Theory for Information Security
  7. Public-Key Algorithms
  8. Elliptic Curve Cryptography
  9. IBE (Identity-Based Encryption)
  10. Cryptographic Protocols
  11. Quantum Cryptography
  12. Key Lengths
  13. Key Management
  14. Secure Electronic Voting Protocols
  15. Digital Evidence
  16. Digital Watermarking and Steganography
  17. Law Enforcement and Digital Evidence
  18. Forensic Computing
  19. Computer Forensic Procedures and Methods
  20. Computer Forensics: Computer Media Reviews in Classified Government Agencies
  21. Forensic Analysis of Unix Systems
  22. Forensic Analysis of Windows Systems
  23. Operating System Security
  24. Unix Security
  25. Linux Security
  26. OpenVMS Security
  27. Windows 2000 Security
  28. Software Development and Quality Assurance
  29. The Common Criteria

About the Author: Hossein Bidgoli, Ph.D., is professor Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States. he is the author of 43 textbooks, 27 manuals and over five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor -in-chief of the Internet Encyclopedia and the Encyclopedia of Information Systems. The Encyclopedia of Information Systems.


This volume is part of a 3 volume set including Volume 1, Key Concepts, Infrastructure, Standards and Protocols, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations and Volume 3, Threats, Vulnerabilities, Prevention, Detection, and Management.


Handbook of Information Security - Three Volume Set Includes:

  • Volume I: Key Concepts, Infrastructure, Standards and Protocols;
  • Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations
  • Volume III: Threats, Vulnerabilities, Prevention, Detection and Management