Cargando…

Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bidgoli, Hossein
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Contents
  • Preface
  • Guide to The Handbook of Information Security
  • PART 1: Key Concepts and Applications Related to Information Security
  • Internet Basics
  • INTRODUCTION
  • INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB
  • DOMAIN NAME SYSTEMS
  • NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES
  • INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE
  • WHAT IS AN INTRANET?
  • INTERNET VERSUS INTRANETS
  • SELECTED APPLICATIONS OF AN INTRANET
  • WHAT IS AN EXTRANET?
  • SELECTED INTERNET APPLICATIONS
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Digital Economy
  • INTRODUCTION
  • INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE
  • SIZE AND GROWTH OF THE DIGITAL ECONOMY
  • IMPLICATIONS FOR MARKETS AND ORGANIZATIONS
  • SECURITY
  • GOVERNMENT POLICIES
  • WORK, PLAY, AND COMMUNITIES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Online Retail Banking: Security Concerns, Breaches, and Controls
  • INTRODUCTION
  • TYPES OF ONLINE RETAIL BANKING SERVICES
  • ONLINE BANKING SECURITY CONCERNS
  • DEFINITION OF SECURITY
  • SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES
  • SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Digital Libraries: Security and Preservation Considerations
  • INTRODUCTION
  • CONSTRUCTING DIGITAL LIBRARIES
  • SECURITY AND DIGITAL LIBRARIES
  • PRESERVATION AND DIGITAL LIBRARIES
  • CONTINUITY OF DIGITAL LIBRARIES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • E-Mail and Instant Messaging
  • INTRODUCTION
  • ELECTRONIC MAIL
  • INSTANT MESSAGING
  • SECURITY IN E-MAIL AND IM ENVIRONMENTS
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Internet Relay Chat
  • SECURE COMMUNICATION USING INTERNET RELAY CHAT
  • STRUCTURE AND OPERATION
  • SOCIAL FACTORS
  • SECURITY AND LEGAL ISSUES
  • FUTURE OF IRC
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Online Communities
  • INTRODUCTION
  • DEFINITION AND ATTRIBUTES
  • HISTORY OF ONLINE COMMUNITIES
  • TYPES OF ONLINE COMMUNITIES
  • ONLINE COMMUNITY CONSEQUENCES
  • RESEARCH METHODS AND ISSUES
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
  • INTRODUCTION
  • WHY GROUPWARE?
  • GROUPWARE AND SECURITY
  • DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE
  • GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE
  • GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Search Engines: Security, Privacy, and Ethical Issues
  • INTRODUCTION
  • SEARCHER
  • SEARCH ENGINE
  • WEB SITE
  • SEARCH ETHICS
  • CONCLUSION
  • GLOSS.