Contributors
Tarek F. Abdelzhaer
University of Virginia
Security and Web Quality of Service
Dawn Alexander
University of Maryland
Protecting Web Sites
Edward Amoroso
AT&T Laboratories
Network Attacks
Michael R. Anderson
SCERC
Computer Forensics—Computer Media Reviews in Classified Government Agencies
Nadeem Ansari
Wayne State University
Home Area Networking
Amy W. Apon
University of Arkansas
Public Network Technologies and Security
Onur Ihsan Arsun
Isik University, Turkey
Security Insurance and Best Practices
Vijay Atluri
Rutgers University
Mobile Commerce
Pierre Balthazard
Arizona State University
Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
William Bard
The University of Texas, Austin
Digital Communication
William C. Barker
National Institute of Standards and Technology
E-Government Security Issues and Measures
Kent Belasco
First Midwest Bank
Online Retail Banking: Security Concerns, Breaches, and Controls
István Zsolt Berta
Budapest University of Technology and Economics, Hungary
Standards for Product Security Assessment
Bhagyavati
Columbus State University
E-Mail and Instant Messaging
Hossein Bidgoli
California State University, Bakersfield
Guidelines for a Comprehensive Security System Internet Basics
Gerald Bluhm
Tyco Fire & Security
Patent Law
Andrew Blyth
University of Glamorgan, Pontypridd, UK
Computer Network Operations (CNO)
Robert J. Boncella
Washburn University
Secure Sockets Layer (SSL)
Wireless Threats and Attacks
Charles Border
Rochester Institute ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.