VOLUME 2: INFORMATION WARFARE; SOCIAL, LEGAL, AND INTERNATIONAL ISSUES; AND SECURITY FOUNDATIONS.
Part 1: Information Warfare.
Cyber crime and the U.S. Criminal Justice System
Cyber terrorism and information security
Online stalking
Electronic attacks
Wireless information warfare
Computer networks operations
Electronic protection
Information assurance
Part 2: Social and Legal Issues.
The legal implications of information security: regulatory compliance and liability
Hackers, crackers, and computer criminals
Hacktivism
Corporate spying: the legal aspects
Law enforcement and computer security threats and measures
Combinating the cyber crime threat: developments in global law enforcement
Digital identity
Digital divide
Legal, social, and ethical issues of the internet
Anonymity and identity in the internet
Spam and the legal counter hacks
Cyberlaw: the major areas, development and information security aspects
Global aspects of cyberlaw
Privacy law and the Internet
Internet censorship
Copyright law
Patent Law
Trademark law and the internet
Online contracts
Electronic speech
Software piracy
Internet gambling
The digital millennium copyright act
Digital courts, the law and evidence
Part 3: Foundations of Information, Computer and Network Security.
Encryption basics
Symmetric key encryption
Data encryption standards (DES)
The advanced encryption standards
Hashes and message digests
Number theory for information security
Public key algorithms
Elliptic curve cryptography
IBE (Identity-Based encryption)
Cryptographic protocols
Quantum cryptography
Key lengths
Key management
Secure electronic voting protocols
Digital evidence
Digital watermarking and steganography
Law enforcement and digital evidence
Forensic computing
Computer forensic Procedures and methods
Computer forensic- computer media reviews in classified government agencies
Forensic analysis of UNIX Systems
Forensic analysis of Windows Systems
Operating system security
INUX Security
Linux Security
OpenVMS Security
Windows 2000 Security
Software development and quality assurance
The common criteria