Table of contents for Handbook of information security / edited by Hossein Bidgoli.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
Forthcoming
The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief, Copyright ( 
John Wiley & Sons, Inc., 2005, Hoboken, N.J, ALL RIGHTS RESERVED.
Table of Contents
The Handbook of Information Security
(Organized based on the contents of each volume)
February 11, 2005
Hossein Bidgoli, Ph.D.
Editor-in-Chief
Copyright (
John Wiley & Sons, Inc., 2005
Hoboken, N.J. 07030
The Handbook of Information Security, Volume I
Key Concepts, Infrastructure, Standards and Protocols
Contents
Part 1: Key Concepts and Applications related to Information Security 
1. Internet Basics									I-1
2. Digital Economy								I-2
3. Online Retail Banking: Security Concerns, Breaches, and Controls		I-3
4. Digital Libraries: Security and Preservation Considerations			I-4
5. E-Mail and Instant Messaging							I-5
6. Internet Relay Chat								I-6
7. Online Communities								I-7
8. Groupware: Risks, Threats, and Vulnerabilities in the Internet Age		I-8
9. Search Engines: Security, Privacy and Ethical Issues				I-9
10. Web Services									I-10
11. Electronic Commerce 								I-11
12. EDI Security									I-12
13. Electronic Payment Systems							I-13
14. Intranets: Principals, Privacy and Security Considerations			I-14
15. Extranets: Applications, Development, Security and Privacy			I-15		
16. Business-to-Business Electronic Commerce					I-16
17. Click-and-Brick Electronic Commerce						I-17
18. Mobile Commerce 								I-18
19. E-education and Information Privacy and Security				I-19
20. Security in E-Learning								I-20
21. E-Government									I-21
22. E-government Security Issues and Measures					I-22
23. International Security Issues of E-Government				I-23
Part 2: Infrastructure for the Internet, Computer Networks and Secure Information Transfer
24. Conducted Communications Media						I-24
25. Routers and Switches						I-25
26. Radio Frequency and Wireless Communications Security			I-26
27. Wireless Channels								I-27
28. Security in Circuit, Message, and Packet Switching				I-28
29. Digital Communication							I-29
30. Local Area Networks								I-30
31. Wide Area and Metropolitan Area Networks					I-31
32. Home Area Networking							I-32
33. Public Network Technologies and Security 					I-33
34. Client/Server Computing: Principles and Security Considerations		I-34
35. Peer-to-Peer Security								I-35
36. Security Middleware								I-36
37. Internet Architecture 								I-37
38. TCP/IP Suite									I-38
39. Voice over Internet Protocol (VoIP)						I-39
40. Security and Web Quality of Service 						I-40
41. Mobile Devices and Protocols						I-41
42. Bluetooth Technology								I-42
43. Wireless Local Area Networks						I-43
44. Security in Wireless Sensor Networks					I-44
45. Cellular Networks								I-45
46. Mobile IP									I-46
47. IP Multicast and its Security							I-47
48. TCP over Wireless Links							I-48
49. Air-Interface Requirements for Mobile Data Services			I-49	
50. Wireless Internet: A Cellular Perspective					I-50
51. Security for Satellite Networks						I-51
52. Security of Broadband Access Networks					I-52
53. Ad hoc Network Security							I-53
Part 3: Standards and Protocols for Secure Information Transfer
54. Standards for Product Security Assessment					I-54
55. Digital Certificates								I-55
56. Internet E-Mail Architecture							I-56
57. PKI (Public Key Infrastructure)						I-57
58. S/MIME (Secure MIME)							I-58
59. PGP (Pretty Good Privacy)							I-59
60. SMTP (Simple Mail Transfer Protocol)					I-60
61. Internet Security Standards							I-61
62. Kerberos 									I-62
63. IPsec: AH (Authentication Header) and ESP (Encapsulating Security Payload) I-63
64. IPsec: IKE (Internet Key Exchange)						I-64
65. Secure Sockets Layer (SSL)							I-65
66. PKCS (Public-Key Cryptography Standards) 				I-66
67. Secure Shell (SSH)								I-67
68. Security and the Wireless Application Protocol (WAP)			I-68
69. Wireless Network Standards and Protocol (802.11) 			I-69
70. P3P (Platform for Privacy Preferences Project)				I-70
The Handbook of Information Security, Volume II
Information Warfare, Social, Legal, and International Issues and Security Foundations
Contents
Part 1: Information Warfare
71. Cybercrime and the U.S. Criminal Justice System				II-1
72. Cyberterrorism and Information Security					II-2
73. Online Stalking								II-3
74. Electronic Attacks								II-4
75. Wireless Information Warfare							II-5
76. Computer Network Operations (CNO)					II-6
77. Electronic Protection								II-7
78. Information Assurance							II-8
Part 2: Social, and Legal Issues 
79. The Legal Implications of Information Security: Regulatory Compliance and Liability II-9
80. Hackers, Crackers and Computer Criminals					II-10
81. Hacktivism									II-11
82. Corporate Spying: The Legal Aspects					II-12
83. Law Enforcement and Computer Security Threats and Measures		II-13
84. Combating the Cyber Crime Threat: Developments in Global Law Enforcement II-14
85. Digital Identity									II-15
86. Digital Divide									II-16
87. Legal, Social and Ethical Issues of the Internet				II-17
88. Anonymity and Identity on the Internet 					II-18
89. Spam and the Legal Counter Attacks						II-19
90. Cyberlaw: The Major Areas, Development, and Information Security Aspects II-20
91. Global Aspects of Cyberlaw							II-21
92. Privacy Law and the Internet							II-22
93. Internet Censorship 								II-23
94. Copyright Law									II-24
95. Patent Law									II-25
96. Trademark Law and the Internet						II-26
97. Online Contracts 								II-27
98. Electronic Speech								II-28
99. Software Piracy								II-29
100. Internet Gambling								II-30
101. The Digital Millennium Copyright Act					II-31
102. Digital Courts, the Law and Evidence					II-32
Part 3: Foundations of Information, Computer and Network Security 
103. Encryption Basics								II-33
104. Symmetric-Key Encryption							II-34
105. Data Encryption Standard (DES)						II-35
106. The Advanced Encryption Standard 					II-36
107. Hashes and Message Digests						II-37
108. Number Theory for Information Security					II-38
109. Public-Key Algorithms							II-39
110. Elliptic Curve Cryptography							II-40
111. IBE (Identity-Based Encryption)						II-41
112. Cryptographic Protocols							II-42
113. Quantum Cryptography							II-43
114. Key Lengths									II-44	
115. Key Management 								II-45
116. Secure Electronic Voting Protocols						II-46
117. Digital Evidence								II-47
118. Digital Watermarking and Steganography					II-48
119. Law Enforcement and Digital Evidence					II-49
120. Forensic Computing								II-50
121. Computer Forensic Procedures and Methods				II-51
122. Computer Forensics: Computer Media Reviews in Classified Government Agencies
II-52
123. Forensic Analysis of Unix Systems						II-53
124. Forensic Analysis of Windows Systems					II-54
125. Operating System Security							II-55
126. Unix Security								II-56
127. Linux Security								II-57
128. OpenVMS Security								II-58
129. Windows 2000 Security							II-59		
130. Software Development and Quality Assurance 				II-60
131. The Common Criteria							II-61
The Handbook of Information Security, Volume III
Threats, Vulnerabilities, Prevention, Detection and Management
Contents
Part 1: Threats and Vulnerabilities to Information and Computing Infrastructures
132. Internal Security Threats							III-1
133. Physical Security Threats							III-2
134. Fixed-Line Telephone System Vulnerabilities				III-3
135. E-Mail Threats and Vulnerabilities 						III-4
136. E-Commerce Vulnerabilities 						III-5
137. Hacking Techniques in Wired Networks 					III-6
138. Hacking Techniques in Wireless Networks 				III-7
139. Computer Viruses and Worms						III-8		
140. Trojan Horse Programs							III-9
141. Hoax Viruses and Virus Alerts						III-10
142. Hostile Java Applets							III-11
143. Spyware									III-12
144. Mobile Code and Security							III-13
145. Wireless Threats and Attacks						III-14
146. WEP Security								III-15
147. Bluetooth Security								III-16
148. Cracking WEP 								III-17	
149. Denial of Service Attacks 							III-18
150. Network Attacks								III-19
151. Fault Attacks								III-20
152. Side-Channel Attacks							III-21
Part 2: Prevention: Keeping the Hackers and Crackers at Bay
153. Physical Security Measures						III-22
154. RFID and Security								III-23
155. Cryptographic Privacy Protection Techniques				III-24
156. Cryptographic Hardware Security Modules					III-25
157. Smart Card Security							III-26
158. Client-Side Security								III-27
159. Server-Side Security							III-28
160. Protecting Web Sites							III-29
161. Database Security								III-30
162. Medical Records Security 							III-31
163. Access Control: Principles and Solutions					III-32	
164. Password Authentication 							III-33
165. Computer and Network Authentication					III-34
166. Antivirus Technology 							III-35
167. Biometric Basics and Biometric Authentication 				III-36
168. Issues and Concerns in Biometric IT Security				III-37
169. Firewall Basics								III-38
170. Firewall Architectures							III-39
171. Packet Filtering and Stateful Firewalls					III-40
172. Proxy Firewalls								III-41
173. E-Commerce Safeguards							III-42
174. Digital Signatures and Electronic Signatures				III-43
175. E-mail Security								III-44
176. Security for ATM Networks							III-45
177. VPN Basics									III-46
178. VPN Architecture								III-47
179. IP-Based VPN								III-48
180. Identity Management 							III-49
181. The Use of Deception Techniques: Honeypots and Decoys		III-50
182. Active Response to Computer Intrusions					III-51
Part 3: Detection, Recovery, Management and Policy Considerations
183. Intrusion Detection Systems Basics					III-52
184. Host-Based Intrusion Detection Systems					III-53
185. Network-Based Intrusion Detection Systems				III-54
186. The Use of Agent Technology for Intrusion Detection 			III-55
187. Contingency Planning Management					III-56
188. Computer Security Incident Response Teams (CSIRTs)			III-57	
189. Implementing a Security Awareness Program				III-58
190. Risk Management for IT Security						III-59
191. Security Insurance and Best Practices					III-60
192. Auditing Information Systems Security 					III-61
193. Evidence Collection and Analysis Tools					III-62
194. Information Leakage: Detection and Countermeasures			III-63
195. Digital Rights Management							III-64
196. Web Hosting 								III-65
197. Managing a Network Environment						III-66
198. E-Mail and Internet Use Policies						III-67
199. Forward Security: Adoptive Cryptography Time Evolution			III-68
200. Security Policy Guidelines							III-69
201. The Asset-Security Goals Continuum: A Process for Security 		III-70	
202. Multilevel Security 								III-71
203. Multilevel Security Models 							III-72
204. Security Architectures							III-73
205. Quality of Security Service: Adaptive Security				III-74
206. Security Policy Enforcement						III-75
207. Guidelines for a Comprehensive Security System				III-76

Library of Congress Subject Headings for this publication:

Computer network -- Security measures.
Home computer networks.