Handbook of information security Volume 1, Key concepts, infrastructure, standards, and protocols Volume 1, Key concepts, infrastructure, standards, and protocols /
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
John Wiley
c2006.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627050606719 |
Tabla de Contenidos:
- HANDBOOK OF INFORMATION SECURITY: Key Concepts, Infrastructure, Standards, and Protocols Volume 1; Contents; Preface; Guide to The Handbook of Information Security; PART 1: Key Concepts and Applications Related to Information Security; Internet Basics; INTRODUCTION; INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB; DOMAIN NAME SYSTEMS; NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES; INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE; WHAT IS AN INTRANET?; INTERNET VERSUS INTRANETS; SELECTED APPLICATIONS OF AN INTRANET; WHAT IS AN EXTRANET?; SELECTED INTERNET APPLICATIONS; GLOSSARY
- CROSS REFERENCESREFERENCES; FURTHER READING; Digital Economy; INTRODUCTION; INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE; SIZE AND GROWTH OF THE DIGITAL ECONOMY; IMPLICATIONS FOR MARKETS AND ORGANIZATIONS; SECURITY; GOVERNMENT POLICIES; WORK, PLAY, AND COMMUNITIES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Online Retail Banking: Security Concerns, Breaches, and Controls; INTRODUCTION; TYPES OF ONLINE RETAIL BANKING SERVICES; ONLINE BANKING SECURITY CONCERNS; DEFINITION OF SECURITY; SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES
- SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHESCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Digital Libraries: Security and Preservation Considerations; INTRODUCTION; CONSTRUCTING DIGITAL LIBRARIES; SECURITY AND DIGITAL LIBRARIES; PRESERVATION AND DIGITAL LIBRARIES; CONTINUITY OF DIGITAL LIBRARIES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; E-Mail and Instant Messaging; INTRODUCTION; ELECTRONIC MAIL; INSTANT MESSAGING; SECURITY IN E-MAIL AND IM ENVIRONMENTS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Internet Relay Chat
- SECURE COMMUNICATION USING INTERNET RELAY CHATSTRUCTURE AND OPERATION; SOCIAL FACTORS; SECURITY AND LEGAL ISSUES; FUTURE OF IRC; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Online Communities; INTRODUCTION; DEFINITION AND ATTRIBUTES; HISTORY OF ONLINE COMMUNITIES; TYPES OF ONLINE COMMUNITIES; ONLINE COMMUNITY CONSEQUENCES; RESEARCH METHODS AND ISSUES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Groupware: Risks, Threats, and Vulnerabilities in the Internet Age; INTRODUCTION; WHY GROUPWARE?; GROUPWARE AND SECURITY; DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE
- GROUPWARE FUNCTIONALITIES IN THE INTERNET AGEGROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Search Engines: Security, Privacy, and Ethical Issues; INTRODUCTION; SEARCHER; SEARCH ENGINE; WEB SITE; SEARCH ETHICS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Web Services; INTRODUCTION; THE GENESIS OF WEB SERVICES; WEB SERVICES TODAY; THE FUTURE OF WEB SERVICES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Electronic Commerce; INTRODUCTION
- A BRIEF HISTORY OF E-COMMERCE