Handbook of Information Security, Volume II, Information Warfare, Social, Legal, and International Issues and Security Foundations
More than 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare
Hossein Bidgoli
Hardcover
1008 pages
January 2006
From the Publisher:
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The 3 Volumes contain over 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Key features:
- The Handbook provides researchers and managers with a solid coverage of the core technologies and applications in the information security field.
- Articles in the Handbook have been rigorously peer-reviewed by more than 1,000 experts chosen from around the world.
- The 3 volumes include more than 200 articles from over 200 leading experts.
Table of Contents for Volume II include:
Part 1: Information Warfare
- Cybercrime and the U.S. Criminal Justice System
- Cyberterrorism and Information Security
- Online Stalking
- Electronic Attacks
- Wireless Information Warfare
- Computer Network Operations (CNO)
- Electronic Protection
- Information Assurance
Part 2: Social, and Legal Issues
- The Legal Implications of Information Security: Regulatory Compliance and Liability
- Hackers, Crackers and Computer Criminals
- Hacktivism
- Corporate Spying: The Legal Aspects
- Law Enforcement and Computer Security Threats and Measures
- Combating the Cyber Crime Threat: Developments in Global Law Enforcement
- Digital Identity
- Digital Divide
- Legal, Social and Ethical Issues of the Internet
- Anonymity and Identity on the Internet
- Spam and the Legal Counter Attacks
- Cyberlaw: The Major Areas, Development, and Information Security Aspects
- Global Aspects of Cyberlaw
- Privacy Law and the Internet
- Internet Censorship
- Copyright Law
- Patent Law
- Trademark Law and the Internet
- Online Contracts
- Electronic Speech
- Software Piracy
- Internet Gambling
- The Digital Millennium Copyright Act
- Digital Courts, the Law and Evidence
Part 3: Foundations of Information, Computer and Network Security
- Encryption Basics
- Symmetric-Key Encryption
- Data Encryption Standard (DES)
- The Advanced Encryption Standard
- Hashes and Message Digests
- Number Theory for Information Security
- Public-Key Algorithms
- Elliptic Curve Cryptography
- IBE (Identity-Based Encryption)
- Cryptographic Protocols
- Quantum Cryptography
- Key Lengths
- Key Management
- Secure Electronic Voting Protocols
- Digital Evidence
- Digital Watermarking and Steganography
- Law Enforcement and Digital Evidence
- Forensic Computing
- Computer Forensic Procedures and Methods
- Computer Forensics: Computer Media Reviews in Classified Government Agencies
- Forensic Analysis of Unix Systems
- Forensic Analysis of Windows Systems
- Operating System Security
- Unix Security
- Linux Security
- OpenVMS Security
- Windows 2000 Security
- Software Development and Quality Assurance
- The Common Criteria
About the Author: Hossein Bidgoli, Ph.D., is professor Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States. he is the author of 43 textbooks, 27 manuals and over five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor -in-chief of the Internet Encyclopedia and the Encyclopedia of Information Systems. The Encyclopedia of Information Systems.
This volume is part of a 3 volume set including Volume 1, Key Concepts, Infrastructure, Standards and Protocols, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations and Volume 3, Threats, Vulnerabilities, Prevention, Detection, and Management.
Handbook of Information Security - Three Volume Set Includes:
- Volume I: Key Concepts, Infrastructure, Standards and Protocols;
- Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations
- Volume III: Threats, Vulnerabilities, Prevention, Detection and Management