Handbook of information security Volume 1, Key concepts, infrastructure, standards, and protocols Volume 1, Key concepts, infrastructure, standards, and protocols /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bidgoli, Hossein, author (author), Bidgoli, Hossein (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley c2006.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627050606719
Tabla de Contenidos:
  • HANDBOOK OF INFORMATION SECURITY: Key Concepts, Infrastructure, Standards, and Protocols Volume 1; Contents; Preface; Guide to The Handbook of Information Security; PART 1: Key Concepts and Applications Related to Information Security; Internet Basics; INTRODUCTION; INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB; DOMAIN NAME SYSTEMS; NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES; INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE; WHAT IS AN INTRANET?; INTERNET VERSUS INTRANETS; SELECTED APPLICATIONS OF AN INTRANET; WHAT IS AN EXTRANET?; SELECTED INTERNET APPLICATIONS; GLOSSARY
  • CROSS REFERENCESREFERENCES; FURTHER READING; Digital Economy; INTRODUCTION; INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE; SIZE AND GROWTH OF THE DIGITAL ECONOMY; IMPLICATIONS FOR MARKETS AND ORGANIZATIONS; SECURITY; GOVERNMENT POLICIES; WORK, PLAY, AND COMMUNITIES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Online Retail Banking: Security Concerns, Breaches, and Controls; INTRODUCTION; TYPES OF ONLINE RETAIL BANKING SERVICES; ONLINE BANKING SECURITY CONCERNS; DEFINITION OF SECURITY; SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES
  • SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHESCONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Digital Libraries: Security and Preservation Considerations; INTRODUCTION; CONSTRUCTING DIGITAL LIBRARIES; SECURITY AND DIGITAL LIBRARIES; PRESERVATION AND DIGITAL LIBRARIES; CONTINUITY OF DIGITAL LIBRARIES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; E-Mail and Instant Messaging; INTRODUCTION; ELECTRONIC MAIL; INSTANT MESSAGING; SECURITY IN E-MAIL AND IM ENVIRONMENTS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Internet Relay Chat
  • SECURE COMMUNICATION USING INTERNET RELAY CHATSTRUCTURE AND OPERATION; SOCIAL FACTORS; SECURITY AND LEGAL ISSUES; FUTURE OF IRC; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Online Communities; INTRODUCTION; DEFINITION AND ATTRIBUTES; HISTORY OF ONLINE COMMUNITIES; TYPES OF ONLINE COMMUNITIES; ONLINE COMMUNITY CONSEQUENCES; RESEARCH METHODS AND ISSUES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Groupware: Risks, Threats, and Vulnerabilities in the Internet Age; INTRODUCTION; WHY GROUPWARE?; GROUPWARE AND SECURITY; DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE
  • GROUPWARE FUNCTIONALITIES IN THE INTERNET AGEGROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Search Engines: Security, Privacy, and Ethical Issues; INTRODUCTION; SEARCHER; SEARCH ENGINE; WEB SITE; SEARCH ETHICS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Web Services; INTRODUCTION; THE GENESIS OF WEB SERVICES; WEB SERVICES TODAY; THE FUTURE OF WEB SERVICES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Electronic Commerce; INTRODUCTION
  • A BRIEF HISTORY OF E-COMMERCE