skip to content
Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols Preview this item
ClosePreview this item
Checking...

Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols

Author: Hossein Bidgoli
Publisher: Hoboken, N.J. : John Wiley, ©2006.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Hossein Bidgoli
ISBN: 9780470051191 0470051191 128040938X 9781280409387
OCLC Number: 647810567
Description: 1 online resource (xxvii, 1092 pages) : illustrations
Contents: Cover --
Contents --
Preface --
Guide to The Handbook of Information Security --
PART 1: Key Concepts and Applications Related to Information Security --
Internet Basics --
INTRODUCTION --
INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB --
DOMAIN NAME SYSTEMS --
NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES --
INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE --
WHAT IS AN INTRANET? --
INTERNET VERSUS INTRANETS --
SELECTED APPLICATIONS OF AN INTRANET --
WHAT IS AN EXTRANET? --
SELECTED INTERNET APPLICATIONS --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
FURTHER READING --
Digital Economy --
INTRODUCTION --
INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE --
SIZE AND GROWTH OF THE DIGITAL ECONOMY --
IMPLICATIONS FOR MARKETS AND ORGANIZATIONS --
SECURITY --
GOVERNMENT POLICIES --
WORK, PLAY, AND COMMUNITIES --
CONCLUSION --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
FURTHER READING --
Online Retail Banking: Security Concerns, Breaches, and Controls --
INTRODUCTION --
TYPES OF ONLINE RETAIL BANKING SERVICES --
ONLINE BANKING SECURITY CONCERNS --
DEFINITION OF SECURITY --
SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES --
SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES --
CONCLUSION --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
FURTHER READING --
Digital Libraries: Security and Preservation Considerations --
INTRODUCTION --
CONSTRUCTING DIGITAL LIBRARIES --
SECURITY AND DIGITAL LIBRARIES --
PRESERVATION AND DIGITAL LIBRARIES --
CONTINUITY OF DIGITAL LIBRARIES --
CONCLUSION --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
E-Mail and Instant Messaging --
INTRODUCTION --
ELECTRONIC MAIL --
INSTANT MESSAGING --
SECURITY IN E-MAIL AND IM ENVIRONMENTS --
CONCLUSION --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
FURTHER READING --
Internet Relay Chat --
SECURE COMMUNICATION USING INTERNET RELAY CHAT --
STRUCTURE AND OPERATION --
SOCIAL FACTORS --
SECURITY AND LEGAL ISSUES --
FUTURE OF IRC --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
FURTHER READING --
Online Communities --
INTRODUCTION --
DEFINITION AND ATTRIBUTES --
HISTORY OF ONLINE COMMUNITIES --
TYPES OF ONLINE COMMUNITIES --
ONLINE COMMUNITY CONSEQUENCES --
RESEARCH METHODS AND ISSUES --
CONCLUSION --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
Groupware: Risks, Threats, and Vulnerabilities in the Internet Age --
INTRODUCTION --
WHY GROUPWARE? --
GROUPWARE AND SECURITY --
DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE --
GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE --
GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS --
CONCLUSION --
GLOSSARY --
CROSS REFERENCES --
REFERENCES --
FURTHER READING --
Search Engines: Security, Privacy, and Ethical Issues --
INTRODUCTION --
SEARCHER --
SEARCH ENGINE --
WEB SITE --
SEARCH ETHICS --
CONCLUSION --
GLOSS.
Other Titles: Key concepts, infrastructure, standards, and protocols
Responsibility: Hossein Bidgoli, editor-in-chief.

Abstract:

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/647810567> # Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
   library:oclcnum "647810567" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/766907838#Place/hoboken_n_j> ; # Hoboken, N.J.
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/766907838#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/766907838#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/766907838#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://id.worldcat.org/fast/959166> ; # Home computer networks
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:alternateName "Key concepts, infrastructure, standards, and protocols" ;
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/17437120> ; # Hossein Bidgoli
   schema:copyrightYear "2006" ;
   schema:datePublished "2006" ;
   schema:description "The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare."@en ;
   schema:description "Cover -- Contents -- Preface -- Guide to The Handbook of Information Security -- PART 1: Key Concepts and Applications Related to Information Security -- Internet Basics -- INTRODUCTION -- INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB -- DOMAIN NAME SYSTEMS -- NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES -- INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE -- WHAT IS AN INTRANET? -- INTERNET VERSUS INTRANETS -- SELECTED APPLICATIONS OF AN INTRANET -- WHAT IS AN EXTRANET? -- SELECTED INTERNET APPLICATIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Economy -- INTRODUCTION -- INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE -- SIZE AND GROWTH OF THE DIGITAL ECONOMY -- IMPLICATIONS FOR MARKETS AND ORGANIZATIONS -- SECURITY -- GOVERNMENT POLICIES -- WORK, PLAY, AND COMMUNITIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Retail Banking: Security Concerns, Breaches, and Controls -- INTRODUCTION -- TYPES OF ONLINE RETAIL BANKING SERVICES -- ONLINE BANKING SECURITY CONCERNS -- DEFINITION OF SECURITY -- SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES -- SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Libraries: Security and Preservation Considerations -- INTRODUCTION -- CONSTRUCTING DIGITAL LIBRARIES -- SECURITY AND DIGITAL LIBRARIES -- PRESERVATION AND DIGITAL LIBRARIES -- CONTINUITY OF DIGITAL LIBRARIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- E-Mail and Instant Messaging -- INTRODUCTION -- ELECTRONIC MAIL -- INSTANT MESSAGING -- SECURITY IN E-MAIL AND IM ENVIRONMENTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Internet Relay Chat -- SECURE COMMUNICATION USING INTERNET RELAY CHAT -- STRUCTURE AND OPERATION -- SOCIAL FACTORS -- SECURITY AND LEGAL ISSUES -- FUTURE OF IRC -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Communities -- INTRODUCTION -- DEFINITION AND ATTRIBUTES -- HISTORY OF ONLINE COMMUNITIES -- TYPES OF ONLINE COMMUNITIES -- ONLINE COMMUNITY CONSEQUENCES -- RESEARCH METHODS AND ISSUES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Groupware: Risks, Threats, and Vulnerabilities in the Internet Age -- INTRODUCTION -- WHY GROUPWARE? -- GROUPWARE AND SECURITY -- DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE -- GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE -- GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Search Engines: Security, Privacy, and Ethical Issues -- INTRODUCTION -- SEARCHER -- SEARCH ENGINE -- WEB SITE -- SEARCH ETHICS -- CONCLUSION -- GLOSS."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/766907838> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:name "Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols"@en ;
   schema:productID "647810567" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/647810567#PublicationEvent/hoboken_n_j_john_wiley_2006> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/766907838#Agent/john_wiley> ; # John Wiley
   schema:url <http://proquest.tech.safaribooksonline.de/9780471648307> ;
   schema:url <http://site.ebrary.com/id/10308281> ;
   schema:url <http://www.myilibrary.com?id=40938> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=152289> ;
   schema:url <http://www.myilibrary.com?id=40938&ref=toc> ;
   schema:url <http://proquest.safaribooksonline.com/9780471648307> ;
   schema:workExample <http://worldcat.org/isbn/9780470051191> ;
   schema:workExample <http://worldcat.org/isbn/9781280409387> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/647810567> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/766907838#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/766907838#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/766907838#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/959166> # Home computer networks
    a schema:Intangible ;
   schema:name "Home computer networks"@en ;
    .

<http://viaf.org/viaf/17437120> # Hossein Bidgoli
    a schema:Person ;
   schema:familyName "Bidgoli" ;
   schema:givenName "Hossein" ;
   schema:name "Hossein Bidgoli" ;
    .

<http://worldcat.org/isbn/9780470051191>
    a schema:ProductModel ;
   schema:isbn "0470051191" ;
   schema:isbn "9780470051191" ;
    .

<http://worldcat.org/isbn/9781280409387>
    a schema:ProductModel ;
   schema:isbn "128040938X" ;
   schema:isbn "9781280409387" ;
    .

<http://www.worldcat.org/title/-/oclc/647810567>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/647810567> ; # Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols
   schema:dateModified "2017-12-23" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.