Book description
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Table of contents
- Cover Page
- Title Page
- Copyright
- Dedication
- About the Editor-in-Chief
- Editorial Board
- Contents
- Contributors
- Preface
- Guide to The Handbook of Information Security
-
PART 1: Key Concepts and Applications Related to Information Security
-
Internet Basics
- INTRODUCTION
- INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB
- DOMAIN NAME SYSTEMS
- NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES
- INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE
- WHAT IS AN INTRANET?
- INTERNET VERSUS INTRANETS
- SELECTED APPLICATIONS OF AN INTRANET
- WHAT IS AN EXTRANET?
- SELECTED INTERNET APPLICATIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Digital Economy
- Online Retail Banking: Security Concerns, Breaches, and Controls
- Digital Libraries: Security and Preservation Considerations
- E-Mail and Instant Messaging
- Internet Relay Chat
- Online Communities
- Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
- Search Engines: Security, Privacy, and Ethical Issues
- Web Services
-
Electronic Commerce
- INTRODUCTION
- A BRIEF HISTORY OF E-COMMERCE
- INTERNET BUSINESS MODELS
- MARKETING STRATEGIES FOUND IN E-COMMERCE
- CONSUMERS IN E-COMMERCE
- INFORMATION SECURITY AND ONLINE PAYMENT IN E-COMMERCE
- EMERGING TECHNOLOGIES
- BARRIERS TO E-COMMERCE DEVELOPMENT
- THE ECONOMIC AND COMPETITIVE IMPACTS OF E-COMMERCE
- CONCLUSIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- EDI Security
- Electronic Payment Systems
- Intranets: Principals, Privacy, and Security Considerations
- Extranets: Applications, Development, Security, and Privacy
- Business-to-Business Electronic Commerce
-
Click-and-Brick Electronic Commerce
- INTRODUCTION
- CLICK-AND-BRICK E-COMMERCE OVERVIEW
- SOURCES OF SYNERGY BETWEEN TRADITIONAL AND E-COMMERCE CHANNELS
- MANAGING CHANNEL CONFLICT IN MULTICHANNEL FIRMS
- SUMMARY OF THE CLICK-AND-BRICK FRAMEWORK
- EXPLORING THE FRAMEWORK WITH SEVERAL CLICK-AND-BRICK CASES
- CLICK-AND-BRICK E-COMMERCE IN PRACTICE
- INFORMATION SECURITY AND CLICK-AND-BRICK RETAILERS
- CONCLUSION
- CROSS REFERENCES
- REFERENCES
- Mobile Commerce
- E-Education and Information Privacy and Security
- Security in E-Learning
- E-Government
- E-Government Security Issues and Measures
- International Security Issues of E-Government
-
Internet Basics
-
PART 2: Infrastructure for the Internet, Computer Networks, and Secure Information Transfer
- Conducted Communications Media
- Routers and Switches
- Radio Frequency and Wireless Communications Security
- Wireless Channels
- Security in Circuit, Message, and Packet Switching
- Digital Communication
-
Local Area Networks
- INTRODUCTION TO LOCAL AREA NETWORKS
- TYPES OF LANs
- LAN HARDWARE AND MEDIA
- LAN SOFTWARE
- ROLE AND APPLICATIONS OF LANs IN THE INTERNET, INTRANET, EXTRANET, AND E-COMMERCE WORLDS
- WIRELESS LOCAL AREA NETWORKS
- LAN INSTALLATION
- LAN ADMINISTRATION
- LAN SECURITY
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Wide Area and Metropolitan Area Networks
- Home Area Networking
- Public Network Technologies and Security
- Client/Server Computing: Principles and Security Considerations
- Peer-to-Peer Security
- Security Middleware
- Internet Architecture
- TCP/IP Suite
- Voice-over Internet Protocol (VoIP)
-
Security and Web Quality of Service
- INTRODUCTION TO SECURITY AND WEB QoS
- WEB QoS ARCHITECTURE AND SECURITY IMPLICATIONS
- THE CHALLENGE OF QoS GUARANTEES
- CURRENT WEB ARCHITECTURE
- PERFORMANCE GUARANTEES AND DENIAL-OF-QoS IN WEB SERVERS
- PERFORMANCE AND SECURITY CONSIDERATIONS IN WEB PROXY SERVERS
- OTHER SECURITY ISSUES
- CONCLUSIONS AND FUTURE TRENDS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Mobile Devices and Protocols
- Bluetooth Technology
- Wireless Local Area Networks
- Security in Wireless Sensor Networks
- Cellular Networks
- Mobile IP
- IP Multicast and Its Security
- TCP over Wireless Links
- Air Interface Requirements for Mobile Data Services
-
Wireless Internet: A Cellular Perspective
- INTRODUCTION
- HETEROGENEOUS NEXT-GENERATION WIRELESS NETWORKS
- WIRELESS LOCAL AREA NETWORKS
- TECHNICAL REQUIREMENTS OF MOBILE INTERNET ARCHITECTURE
- INTERNETWORKING OF THE HETEROGENEOUS WIRELESS INTERNET
- AUGMENTATED MOBILITY, RESOURCE, AND QoS MANAGEMENT
- MOBILE TERMINAL ARCHITECTURE
- RELIABLE MULTICASTING
- CONCLUSION
- ACKNOWLEDGMENTS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
-
Security of Satellite Networks
- INTRODUCTION
- SHORT HISTORY OF SATELLITE COMMUNICATIONS
- WHY AND WHEN TO USE SATELLITES
- SATELLITE SYSTEM CHARACTERISTICS
- Orbits
- Application Layer
- SATELLITE AND SECURITY: REFERENCE SCENARIO
- COMMUNICATION, TRANSMISSION, AND INFORMATION SECURITY
- SECURE SYSTEMS AND APPLICATIONS IMPLEMENTED USING SATELLITES
- ELEMENTS ON MILITARY SATELLITES
- CONCLUSIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Security of Broadband Access Networks
- Ad Hoc Network Security
-
PART 3: Standards and Protocols for Secure Information Transfer
- Standards for Product Security Assessment
- Digital Certificates
- Internet E-Mail Architecture
- PKI (Public Key Infrastructure)
- S/MIME (Secure MIME)
- PGP (Pretty Good Privacy)
-
SMTP (Simple Mail Transfer Protocol)
- INTRODUCTION
- SMTP FUNDAMENTALS
- SMTP MODEL AND PROTOCOL
- USER AGENT
- MAIL TRANSFER AGENT
- SMTP SERVER
- ON-DEMAND MAIL RELAY
- MULTIPURPOSE INTERNET MAIL EXTENSIONS (MIME)
- MAIL TRANSMISSION TYPES
- MAIL ACCESS MODES
- MAIL ACCESS PROTOCOLS
- SMTP SECURITY ISSUES
- POP AND IMAP VULNERABILITIES
- STANDARDS, ORGANIZATIONS, AND ASSOCIATIONS
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Internet Security Standards
- Kerberos
- IPsec: AH and ESP
- IPsec: IKE (Internet Key Exchange)
- Secure Sockets Layer (SSL)
-
PKCS (Public Key Cryptography Standards)
- INTRODUCTION
- PKCS 1: RSA CRYPTOGRAPHY STANDARD
- PKCS 5: PASSWORD-BASED CRYPTOGRAPHY STANDARD
- PKCS 6: EXTENDED-CERTIFICATE SYNTAX STANDARD (HISTORIC)
- PKCS 7 AND RFC 3369: CRYPTOGRAPHIC MESSAGE SYNTAX (CMS)
- PKCS 8: PRIVATE KEY INFORMATION SYNTAX STANDARD
- PKCS 9: SELECTED OBJECT CLASSES AND ATTRIBUTE TYPES
- PKCS 10: CERTIFICATION REQUEST SYNTAX STANDARD
- PKCS 11: CRYPTOGRAPHIC TOKEN INTERFACE STANDARD
- PKCS 12: PERSONAL INFORMATION EXCHANGE SYNTAX STANDARD
- PKCS 15: CRYPTOGRAPHIC TOKEN INFORMATION SYNTAX STANDARD
- AN EXAMPLE
- ACKNOWLEDGMENTS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
-
Public Key Standards: Secure Shell
- SSH INTRODUCTION AND ITS HISTORY
- SSH FUNCTIONALITY AND SERVICES
- SSH DATA TYPES, MESSAGE FORMATS AND ALGORITHM NAMING
- SSH PROTOCOL ARCHITECTURE
- SECURE FILE TRANSFER PROTOCOL
- SECURE TUNNELING: TCP PORT FORWARDING AND X FORWARDING
- SSH KEY MANAGEMENT
- SECURITY
- SSH IN THE REAL WORLD
- CONCLUSION
- ACKNOWLEDGMENT
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Security and the Wireless Application Protocol
- Wireless Network Standards and Protocol 802.11
- P3P (Platform for Privacy Preferences Project)
- Reviewers List
- Index
Product information
- Title: Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols
- Author(s):
- Release date: January 2006
- Publisher(s): Wiley
- ISBN: 9780471648307
You might also like
book
Radar Trends to Watch: August 2023
Read about the latest developments on O'Reilly Media's Radar.
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …
book
Information Security Policies, Procedures, and Standards
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to …