Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols /
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
John Wiley,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Contents
- Preface
- Guide to The Handbook of Information Security
- PART 1: Key Concepts and Applications Related to Information Security
- Internet Basics
- INTRODUCTION
- INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB
- DOMAIN NAME SYSTEMS
- NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES
- INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE
- WHAT IS AN INTRANET?
- INTERNET VERSUS INTRANETS
- SELECTED APPLICATIONS OF AN INTRANET
- WHAT IS AN EXTRANET?
- SELECTED INTERNET APPLICATIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Digital Economy
- INTRODUCTION
- INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE
- SIZE AND GROWTH OF THE DIGITAL ECONOMY
- IMPLICATIONS FOR MARKETS AND ORGANIZATIONS
- SECURITY
- GOVERNMENT POLICIES
- WORK, PLAY, AND COMMUNITIES
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Online Retail Banking: Security Concerns, Breaches, and Controls
- INTRODUCTION
- TYPES OF ONLINE RETAIL BANKING SERVICES
- ONLINE BANKING SECURITY CONCERNS
- DEFINITION OF SECURITY
- SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES
- SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Digital Libraries: Security and Preservation Considerations
- INTRODUCTION
- CONSTRUCTING DIGITAL LIBRARIES
- SECURITY AND DIGITAL LIBRARIES
- PRESERVATION AND DIGITAL LIBRARIES
- CONTINUITY OF DIGITAL LIBRARIES
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- E-Mail and Instant Messaging
- INTRODUCTION
- ELECTRONIC MAIL
- INSTANT MESSAGING
- SECURITY IN E-MAIL AND IM ENVIRONMENTS
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Internet Relay Chat
- SECURE COMMUNICATION USING INTERNET RELAY CHAT
- STRUCTURE AND OPERATION
- SOCIAL FACTORS
- SECURITY AND LEGAL ISSUES
- FUTURE OF IRC
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Online Communities
- INTRODUCTION
- DEFINITION AND ATTRIBUTES
- HISTORY OF ONLINE COMMUNITIES
- TYPES OF ONLINE COMMUNITIES
- ONLINE COMMUNITY CONSEQUENCES
- RESEARCH METHODS AND ISSUES
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
- INTRODUCTION
- WHY GROUPWARE?
- GROUPWARE AND SECURITY
- DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE
- GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE
- GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Search Engines: Security, Privacy, and Ethical Issues
- INTRODUCTION
- SEARCHER
- SEARCH ENGINE
- WEB SITE
- SEARCH ETHICS
- CONCLUSION
- GLOSS.