Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Handbook of Information Security, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations

Gebonden Engels 2006 9780471648314
In herdruk, verschijningsdatum onbekend


The 'Handbook of Information Security' is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.


Aantal pagina's:978
Hoofdrubriek:IT-management / ICT


Wees de eerste die een lezersrecensie schrijft!

Geef uw waardering

Zeer goed Goed Voldoende Matig Slecht

Over Hossein Bidgoli

Hossein Bidgoli, Ph.D., is professor Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States. he is the author of 43 textbooks, 27 manuals and over five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor -in-chief of the Internet Encyclopedia and the Encyclopedia of Information Systems. The Encyclopedia of Information Systems. The Encyclopedia of Information Systems was the recipient of one of the Library Journal's Best Reference Sources for 2002 and The Internet Encyclopedia was recipient of one of the PSP Awards (Professional and Scholarly Publishing), 2004. Dr. Bidgoli was selected as the California State University, Bakersfield's 2001-2002 Professor of the Year.

Andere boeken door Hossein Bidgoli



Part 1: Information Warfare.
Cyber crime and the U.S. Criminal Justice System
Cyber terrorism and information security
Online stalking
Electronic attacks
Wireless information warfare
Computer networks operations
Electronic protection
Information assurance

Part 2: Social and Legal Issues.
The legal implications of information security: regulatory compliance and liability
Hackers, crackers, and computer criminals
Corporate spying: the legal aspects
Law enforcement and computer security threats and measures
Combinating the cyber crime threat: developments in global law enforcement
Digital identity
Digital divide
Legal, social, and ethical issues of the internet
Anonymity and identity in the internet
Spam and the legal counter hacks
Cyberlaw: the major areas, development and information security aspects
Global aspects of cyberlaw
Privacy law and the Internet
Internet censorship
Copyright law
Patent Law
Trademark law and the internet
Online contracts
Electronic speech
Software piracy
Internet gambling
The digital millennium copyright act
Digital courts, the law and evidence

Part 3: Foundations of Information, Computer and Network Security.
Encryption basics
Symmetric key encryption
Data encryption standards (DES)
The advanced encryption standards
Hashes and message digests
Number theory for information security
Public key algorithms
Elliptic curve cryptography
IBE (Identity-Based encryption)
Cryptographic protocols
Quantum cryptography
Key lengths
Key management
Secure electronic voting protocols
Digital evidence
Digital watermarking and steganography
Law enforcement and digital evidence
Forensic computing
Computer forensic Procedures and methods
Computer forensic- computer media reviews in classified government agencies
Forensic analysis of UNIX Systems
Forensic analysis of Windows Systems
Operating system security
INUX Security
Linux Security
OpenVMS Security
Windows 2000 Security
Software development and quality assurance
The common criteria

Managementboek Top 100


Populaire producten



        Handbook of Information Security, Volume 2, Information Warfare, Social, Legal, and International Issues and Security Foundations