Book description
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Table of contents
-
Volume II: Information Warfare; Social, Legal, and International Issues; and Security Foundations
- Cover Page
- Title Page
- Copyright
- Dedication
- About the Editor-in-Chief
- Editorial Board
- Contents
- Contributors
- Preface
- Guide to The Handbook of Information Security
-
PART 1: Information Warfare
- Cybercrime and the U.S. Criminal Justice System
- Cyberterrorism and Information Security
- Online Stalking
- Electronic Attacks
-
Wireless Information Warfare
- INTRODUCTION
- DEFINITION OF WIRELESS INFORMATION WARFARE
- TAXONOMIES OF INFORMATION WARFARE
- TAXONOMIES OF WIRELESS NETWORKS
- UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE
- SECURE COMMUNICATIONS SYSTEM DESIGN
- OFFENSIVE INFORMATION OPERATIONS
- DEFENSIVE INFORMATION OPERATIONS
- WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL
- EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK (VLAN HOPPING)
- EXAMPLE DEFENSE: METHODS OF DEFENSE
- CONCLUSIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
-
Computer Network Operations (CNO)
- INTRODUCTION
- NETWORK DEFENSE AND NETWORK ATTACK
- A MODEL OF COMPUTER NETWORK ATTACK
- TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE
- SURVIVABILITY
- DECEPTION
- DECEPTION TAXONOMY
- STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS
- IMPLEMENTING COMPUTER NETWORK OPERATIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Electronic Protection
- Information Assurance
-
PART 2: Social and Legal Issues
- The Legal Implications of Information Security: Regulatory Compliance and Liability
- Hackers, Crackers, and Computer Criminals
-
Hacktivism
- INTRODUCTION
- THE CULTURE AND FOUNDING ETHICS OF HACKING
- FROM HACKING TO MICROSERFDOM
- HACKTIVISM, TACTICAL MEDIA, AND THE VIRTUAL SIT-IN
- FURTHER EXAMPLES OF HACKTIVIST ACTIONS
- OPEN SOURCE AND FREE SOFTWARE: THE REBIRTH OF THE HACKING ETHIC?
- ALL THAT IS SOLID MELTS INTO AIR
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
-
Corporate Spying: The Legal Aspects
- INTRODUCTION
- A SERIES OF QUESTIONS AND A HYPOTHETICAL
- THE COMMON LAW REMEDIES AND APPROACHES
- THE WIRETAP ACT
- THE STORED COMMUNICATIONS ACT
- THE COMPUTER FRAUD AND ABUSE ACT
- ECONOMIC ESPIONAGE ACT OF 1996
- THE DIGITAL MILLENNIUM COPYRIGHT ACT
- CORPORATE SPYING ON THE INDIVIDUAL
- GOVERNMENT SPYING AND BUSINESSES: THE USA PATRIOT ACT
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
-
Law Enforcement and Computer Security Threats and Measures
- INTRODUCTION
- COMPUTER SECURITY, THE INTERNET, AND CYBERCRIMES
- ESTABLISHING COMPUTER SECURITY THROUGH NATIONAL LAWS
- THE ENFORCEMENT OF NATIONAL LAWS CONCERNING COMPUTER SECURITY
- BUILDING A GLOBAL LEGAL ORDER TO PROTECT COMPUTER SECURITY
- COMPUTER SECURITY AND INTERNATIONAL POLICING
- COMPUTER SECURITY, LAW ENFORCEMENT, AND THE BALANCE OF ORDER AND LIBERTY
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Combating the Cybercrime Threat: Developments in Global Law Enforcement
-
Digital Identity
- WHAT IS DIGITAL IDENTITY?
- DIGITAL IDENTITY AND PRIVACY
- DIGITAL IDENTITY AND IDENTITY THEFT
- DIGITAL IDENTITY AND WEB SERVICES
- DIGITAL IDENTITY ILLUSTRATED
- DIGITAL IDENTITY AND THE CONSUMER
- THE IDENTITY WEB
- IDENTITY DOCUMENTS AND ADDRESSING
- IDENTITY LINKING
- DATA SHARING PERMISSIONS AND CONTRACTS
- OTHER DIGITAL IDENTITY SERVICES
- DIGITAL IDENTITY AND ENTERPRISE APPLICATION INTEGRATION
- THE IDENTITY PLAYERS
- THE FUTURE OF DIGITAL IDENTITY
- GLOSSARY
- CROSS REFERENCES
- FURTHER READING
- Digital Divide
- Legal, Social, and Ethical Issues of the Internet
-
Anonymity and Identity on the Internet
- INTRODUCTION
- MECHANICS OF ANONYMITY AND IDENTITY ON THE NET
- HOW DO WE KNOW WHO ANYONE IS ON THE NET?
- TECHNICAL SOLUTIONS TO IDENTITY AND ANONYMITY
- THE SUPREME COURT SPEAKS
- INTERNET ANONYMITY AND THE LAW
- ANONYMITY DURING WARTIME
- SUBPOENAS SEEKING THE IDENTITY OF ANONYMOUS SPEAKERS
- AN ANONYMOUS DOMAIN REGISTRANT
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- ACKNOWLEDGEMENTS
- REFERENCES
- Spam and the Legal Counter Attacks
- Cyberlaw: The Major Areas, Development, and Information Security Aspects
- Global Aspects of Cyberlaw
- Privacy Law and the Internet
- Internet Censorship
- Copyright Law
- Patent Law
- Trademark Law and the Internet
-
Online Contracts
- INTRODUCTION
- MAINTAINING THE SECURITY OF ELECTRONIC TRANSACTIONS
- THE LEGAL FRAMEWORK FOR ELECTRONIC CONTRACTING
- ENFORCEABILITY OF ONLINE CONTRACTS
- CONTRACTUAL RESTRICTIONS ON THE USE OF SOFTWARE
- SALE OF GOODS LAW AND DIGITAL INFORMATION TRANSACTIONS
- CONSUMER PROTECTION ONLINE
- BEST PRACTICE FOR ONLINE CONTRACTS
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Electronic Speech
- Software Piracy
-
Internet Gambling
- INTRODUCTION: SECURITY RISKS AND OTHER CHALLENGES OF INTERNET GAMBLING
- PHENOMENAL GROWTH OF INTERNET GAMBLING
- SECURITY AND PRIVACY ISSUES FOR INTERNET GAMBLING
- DEBATE OVER PROHIBITION OR REGULATION
- CURRENT REGULATION OF INTERNET GAMBLING
- CONCLUSION: THE FUTURE OF INTERNET GAMBLING
- ACKNOWLEDGMENTS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- The Digital Millennium Copyright Act
- Digital Courts, the Law and Evidence
-
PART 3: Foundations of Information, Computer, and Network Security
- Encryption Basics
- Symmetric Key Encryption
- Data Encryption Standard (DES)
- The Advanced Encryption Standard
- Hashes and Message Digests
- Number Theory for Information Security
- Public Key Algorithms
- Elliptic Curve Cryptography
-
IBE (Identity-Based Encryption)
- INTRODUCTION
- IBC VERSUS PUBLIC KEY CRYPTOGRAPHY
- ALTERNATIVES TO IBE
- THE GUILLOU–QUISQUATER IBS SCHEME
- COCKS's IDENTITY-BASED ENCRYPTION SCHEME
- IDENTIFY-BASED ENCRYPTION USING PAIRINGS
- HIERARCHICAL IDENTITY-BASED ENCRYPTION
- MORE THAN JUST IDENTITIES: EXTENDING IDENTITY-BASED CRYPTOGRAPHY
- CONCLUSIONS AND FURTHER READING
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Cryptographic Protocols
-
Quantum Cryptography
- INTRODUCTION
- PUBLIC VERSUS PRIVATE KEY CRYPTOSYSTEMS
- THE PHOTON POLARIZATION AND THE RULES OF QUANTUM MECHANICS
- NONORTHOGONAL STATES QUANTUM KEY DISTRIBUTION PROTOCOLS
- QUANTUM EAVESDROPPING
- ENTANGLEMENT-BASED QUANTUM KEY DISTRIBUTION PROTOCOL
- SUGGESTIONS FOR FURTHER READING
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Key Lengths
- Key Management
- Secure Electronic Voting Protocols
- Digital Evidence
- Digital Watermarking and Steganography
- Law Enforcement and Digital Evidence
- Forensic Computing
- Computer Forensics Procedures and Methods
-
Computer Forensics—Computer Media Reviews in Classified Government Agencies
- INTRODUCTION
- PERSONAL COMPUTER SECURITY WEAKNESSES: HISTORICAL PERSPECTIVE
- SECURITY RISKS: WINDOWS XP AND NOTEBOOK COMPUTERS
- RISKS ASSOCIATED WITH AMBIENT DATA STORAGE AREAS
- RISKS ASSOCIATED WITH COMPUTER-RELATED STORAGE DEVICES
- CONCERNS SPECIFIC TO CLASSIFIED GOVERNMENT AGENCIES
- FORENSIC SEARCH PRACTICES IN CLASSIFIED SECURITY REVIEWS
- RISKS ASSOCIATED WITH NONTEXT (BINARY) FILES
- CONCLUSIONS
- GLOSSARY
- CROSS REFERENCES
- FURTHER READING
- Forensic Analysis of UNIX Systems
- Forensic Analysis of Windows Systems
- Operating System Security
- UNIX Security
- Linux Security
- OpenVMS Security
- Windows 2000 Security
- Software Development and Quality Assurance
-
The Common Criteria
- INTRODUCTION
- STRUCTURE
- EVALUATIONS, CERTIFICATIONS, AND ACCREDITATIONS
- PROTECTION PROFILES
- SECURITY TARGETS
- SECURITY FUNCTIONAL REQUIREMENTS
- ASSURANCE REQUIREMENTS
- CLASS ACM: CONFIGURATION MANAGEMENT
- CLASS ADO: DELIVERY AND OPERATION
- CLASS ADV: DEVELOPMENT
- CLASS ADG: GUIDANCE DOCUMENTS
- CLASS ALC: LIFE-CYCLE SUPPORT
- CLASS ATE: TESTING
- CLASS AVA: VULNERABILITY ASSESSMENT
- EVALUATION ASSURANCE LEVELS
- CONCLUSIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Reviewers List
- Index
Product information
- Title: Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2
- Author(s):
- Release date: January 2006
- Publisher(s): Wiley
- ISBN: 9780471648314
You might also like
book
Social Media Law for Business: A Practical Guide for Using Facebook, Twitter, Google +, and Blogs Without Stepping on Legal Land Mines
How to Avoid Legal Pitfalls on Social Media Social media is where your customers are--so it's …
book
Social Media and Public Relations: Eight New Practices for the PR Professional
In Social Media and Public Relations: Eight New Practices for the PR Professional, social marketing pioneer …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …
book
The Cyber Citizen’s Guide Through the Legal Jungle: Internet Law for Your Professional Online Presence
If you actively use the internet to advance your business and professional endeavors, you are a …