Handbook of Information Security, Volume III, Threats, Vulnerabilities, Prevention, Detection, and Management

Handbook of Information Security, Volume III, Threats, Vulnerabilities, Prevention, Detection, and Management $300.00
Three Volume Set $900.00
Handbook of Information Security, Volume III, Threats, Vulnerabilities, Prevention, Detection, and Management

More than 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.


Hossein Bidgoli
Hardcover
1152 pages
January 2006

From the Publisher:
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. All 3 Volumes contain over 200 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Key features:

  • The Handbook provides researchers and managers with a solid coverage of the core technologies and applications in the information security field.
  • Articles in the Handbook have been rigorously peer-reviewed by more than 1,000 experts chosen from around the world.
  • The 3 volumes include more than 200 articles from over 200 leading experts.

Table of Contents for Volume III include:

Part 1: Threats and Vulnerabilities to Information and Computing Infrastructures

  1. Internal Security Threats
  2. Physical Security Threats
  3. Fixed-Line Telephone System Vulnerabilities
  4. E-Mail Threats and Vulnerabilities
  5. E-Commerce Vulnerabilities
  6. Hacking Techniques in Wired Networks
  7. Hacking Techniques in Wireless Networks
  8. Computer Viruses and Worms
  9. Trojan Horse Programs
  10. Hoax Viruses and Virus Alerts
  11. Hostile Java Applets
  12. Spyware
  13. Mobile Code and Security Wireless
  14. Threats and Attacks
  15. WEP Security
  16. Bluetooth Security
  17. Cracking WEP
  18. Denial of Service Attacks
  19. Network Attacks
  20. Fault Attacks
  21. Side-Channel Attacks

Part 2: Prevention: Keeping the Hackers and Crackers at Bay

  1. Physical Security Measures
  2. RFID and Security
  3. Cryptographic Privacy Protection Techniques
  4. Cryptographic Hardware Security Modules
  5. Smart Card Security
  6. Client-Side Security
  7. Server-Side Security
  8. Protecting Web Sites
  9. Database Security
  10. Medical Records Security
  11. Access Control: Principles and Solutions
  12. Password Authentication
  13. Computer and Network Authentication
  14. Antivirus Technology
  15. Biometric Basics and Biometric Authentication
  16. Issues and Concerns in Biometric IT Security
  17. Firewall Basics
  18. Firewall Architectures
  19. Packet Filtering and Stateful Firewalls
  20. Proxy Firewalls
  21. E-Commerce Safeguards
  22. Digital Signatures and Electronic Signatures
  23. E-mail Security
  24. Security for ATM Networks
  25. VPN Basics
  26. VPN Architecture
  27. IP-Based VPN
  28. Identity Management
  29. Use of Deception Techniques: Honeypots and Decoys
  30. Active Response to Computer Intrusions

Part 3: Detection, Recovery, Management and Policy Considerations

  1. Intrusion Detection Systems Basics
  2. Host-Based Intrusion Detection Systems
  3. Network-Based Intrusion Detection Systems
  4. Use of Agent Technology for Intrusion Detection
  5. Contingency Planning Management
  6. Computer Security Incident Response Teams (CSIRTs)
  7. Implementing a Security Awareness Program
  8. Risk Assessment for Risk Management
  9. Security Insurance and Best Practices
  10. Auditing Information Systems Security
  11. Evidence Collection and Analysis Tools
  12. Information Leakage: Detection and Countermeasures
  13. Digital Rights Management
  14. Web Hosting
  15. Managing a Network Environment
  16. E-Mail and Internet Use Policies
  17. Forward Security: Adoptive Cryptography Time Evolution
  18. Security Policy Guidelines
  19. The Asset-Security Goals Continuum: A Process for Security
  20. Multilevel Security
  21. Multilevel Security Models
  22. Security Architectures
  23. Quality of Security Service: Adaptive Security
  24. Security Policy Enforcement Guidelines for a Comprehensive Security System

About the Author: Hossein Bidgoli, Ph.D., is professor Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States. he is the author of 43 textbooks, 27 manuals and over five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor -in-chief of the Internet Encyclopedia and the Encyclopedia of Information Systems. The Encyclopedia of Information Systems.


This volume is part of a 3 volume set including Volume 1, Key Concepts, Infrastructure, Standards and Protocols, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations and Volume 3, Threats, Vulnerabilities, Prevention, Detection, and Management.


Handbook of Information Security - Three Volume Set Includes:

  • Volume I: Key Concepts, Infrastructure, Standards and Protocols;
  • Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations
  • Volume III: Threats, Vulnerabilities, Prevention, Detection and Management