HANDBOOK - Dandelon

2y ago
27 Views
6 Downloads
336.22 KB
7 Pages
Last View : 2m ago
Last Download : 3m ago
Upload by : Kairi Hasson
Transcription

2008 AGI-Information Management ConsultantsMay be used for personal purporses only or bylibraries associated to dandelon.com network.HANDBOOKOFINFORMATIONSECURITYThreats, Vulnerabilities, Prevention,Detection, and ManagementVolume 3Hossein BidgoliEditor-in-ChiefCalifornia State UniversityBakersfield, CaliforniaWILEYJohn Wiley & Sons, Inc.

ContentsContributorsPrefaceGuide to the Handbook of Information SecurityReviewers ListVolume Indexxvxxiiixxvi10511059Volume I: Key Concepts,Infrastructure, Standards,and ProtocolsPart 1: Key Concepts and ApplicationsRelated to Information SecurityInternet BasicsHossein Bidgoli3Digital EconomyNirvikar Singh15Online Retail Banking: SecurityBreaches, and ControlsKent Belasco and Siaw-Peng WanConcerns,Digital Libraries: Security and PreservationConsiderationsCavan McCarthy3749Extranets: Applications, Development, Security,and PrivacyStephen W. Thorpe215Business-to-Business Electronic CommerceJulian J. Rav226Click-and-Brick Electronic CommerceCharles Steinfield242Mobile CommerceVijay Atluri254E-Education and Information Privacy and SecurityWilliam K. Jackson268Security in E-LearningEdgar R. Weippl279E-GovernmentShannon Schelin and G. David Garson294E-Government Security Issues and MeasuresWilliam C. Barker306International Security Issues of E-GovernmentKarin Geiselhart318E-Mail and Instant MessagingBhagyavati77Internet Relay ChatPaul L. Witt87Part 2: Infrastructure for the Internet,Computer Networks, and SecureInformation Transfer337Online CommunitiesLee Sproull97Conducted Communications MediaThomas L. PiggRouters and SwitchesHans-Peter Domtnel350Groupware: Risks, Threats, and Vulnerabilitiesin the Internet AgePierre Balthazard and John Warren110Search Engines: Security, Privacy, andEthical IssuesRaymond Wisman126Web ServicesAkhil Sahai, Sven Graupner, and Wooyoung Kim151Electronic CommerceCharles Steinfield164EDI SecurityMatthew K. McGowan179Electronic Payment SystemsIndrajit Ray189Intranets: Principals, Privacy, and SecurityConsiderationsWilliam T. Schiano205Radio Frequency and Wireless CommunicationsSecurityOkechukwu Ugweje363Wireless ChannelsP. M. Shankar387Security in Circuit, Message, and Packet SwitchingRobert H. Greenfield and Daryle P. Niedermayer400Digital CommunicationRobert W. Heath Jr., William Bard, and Atul A. Salvekar415Local Area NetworksWayne C. Summers428Wide Area and Metropolitan Area NetworksLynn A. DeNoia444Home Area NetworkingSherali Zeadally, Priya Kubher, and Nadeem Ansari460ix

CONTENTSPublic Network Technologies and SecurityDale R. Thompson and Amy W. AponClient/Server Computing: Principles and SecurityConsiderationsDaniel J. McFarland473Part 3: Standards and Protocolsfor Secure Information TransferStandards for Product Security AssessmentIstvdn Zsolt Berta, Levente Buttydn, and Istvdn Vajda809489501Digital CertificatesAlbert Levi823Peer-to-Peer SecurityAllan Friedman and L. Jean Camp836Security MiddlewareLinda Volonino and Richard P. Volonino512Internet E-Mail ArchitectureRobert Gezelter852Internet ArchitectureGraham Knight522PKI (Public Key Infrastructure)Radia Perlman859TCP/IP SuitePrabhaker Mateti543S/MIME (Secure MIME)Steven J. Greenwald868Voice-over Internet Protocol (VoIP)Roy Morris561PGP (Pretty Good Privacy)Stephen A. WeisSMTP (Simple Mail Transfer Protocol)Vladimir V. Riabov878Security and Web Quality of ServiceTarek F. Abdelzhaer and Chengdu Huang576Internet Security StandardsRaymond R. Panko901Mobile Devices and ProtocolsMin Song592KerberosWilliam Stallings920Bluetooth TechnologyBrent A. Miller605IPsec: AH and ESPA. Meddeb, N. Boudriga, and M. S. Obaidat932Wireless Local Area NetworksM. S. Obaidat, G. I. Papadimitriou,and S. Obeidat617IPsec: IKE (Internet Key Exchange)Charlie Kaufman944Security in Wireless Sensor NetworksMohamed Eltoweissy, Stephan Olariu,and AshrafWadaa637Secure Sockets Layer (SSL)Robert J. Boncella952PKCS (Public Key Cryptography Standards)Yongge Wang966Cellular NetworksJingyuan Zhang and Ivan Stojmenovic654Public Key Standards: Secure ShellXukai Zou979Mobile IPM. Farooque Mesiya664Security and the Wireless Application ProtocolLillian N. Cassel and Cynthia Pandolfo995IP Multicast and Its SecurityEmilia Rosti680TCP over Wireless LinksMohsen Guizani and Anupama Raju693Air Interface Requirements for Mobile DataServicesHarald Haas712Wireless Network Standards and Protocol (802.11)Prashant Krishnamurthy1007P3P (Platform for Privacy Preferences Project)Lorrie Faith Cranor1023Volume II: Information Warfare:Social, Legal, and InternationalIssues; and Security FoundationsWireless Internet: A Cellular PerspectiveAbbas Jamalipour732Security of Satellite NetworksMichele Luglio and Antonio Saitto754Cybercrime and the U.S. Criminal Justice SystemSusan W. BrennerSecurity of Broadband Access NetworksPeter L. Heinzmann772Cyberterrorism and Information SecurityCharles Jaeger16Ad Hoc Network SecurityPietro Michiardi and Refik Molva787Online StalkingDavid J. Loundv40Part 1: Information Warfare3

CONTENTSxiElectronic AttacksThomas M. Chen, Jimi Thompson, and Matthew C. Elder47Trademark Law and the InternetRay Everett-Church381Wireless Information WarfareRandall K. Nichols59Online ContractsG. E. Evans392Computer Network Operations (CNO)Andrew Blyth89Electronic SpeechSeth Finkelstein408Software PiracyRobert K. Moniot418Internet GamblingSusanna Frederick Fischer428The Digital Millennium Copyright ActSeth Finkelstein446Digital Courts, the Law and EvidenceRobert Slade459Electronic ProtectionNeil C. Rowe101Information AssurancePeng Liu, Meng Yu, and Jiwu Jing110Part 2: Social and Legal IssuesThe Legal Implications of Information Security:Regulatory Compliance and LiabilityBlaze D. Waleski127Hackers, Crackers, and Computer CriminalsDavid Dittrich and Kenneth Einar Himma154HacktivismPaul A. Taylor and Jan 11. Harris172Part 3: Foundations of Information,Computer and Network Security183Encryption BasicsAri Juels469Corporate Spying: The Legal AspectsWilliam A. Zucker and Scott NathanSymmetric Key EncryptionJonathan Katz479Data Encryption Standard (DES)Mike Speciner491Law Enforcement and Computer Security Threatsand MeasuresMathieu Deflem and J. Eagle Shutt200Combating the Cybercrime Threat: Developmentsin Global Law EnforcementRoderic Broadhurst210The Advanced Encryption StandardDuncan A. Buell498Digital IdentityDrummond Reed and Jerry Kindall223Hashes and Message DigestsMagnus Daum and Hans Dobbertin510Digital DivideJaime J. Davila238Number Theory for Information SecurityDuncan A. Buell532Legal, Social, and Ethical Issues of the InternetKenneth Einar Himma247Public Key AlgorithmsBradley S. Rubin548Anonymity and Identity on the InternetJonathan Wallace265Elliptic Curve CryptographyN. P. Smart558Spam and the Legal Counter AttacksCharles Jaeger275IBE (Identity-Based Encryption)Craig Gentry575297Cryptographic ProtocolsMarkus Jakobsson593Global Aspects of CyberlawJulia Alpert Gladstone319Quantum CryptographyG. Massimo Palma606Privacy Law and the InternetRay Everett-Church336Key LengthsArjen K. Lenstra617Internet CensorshipRichard A. Spinello349Key ManagementXukai Zou and Amandeep Thukral636Copyright LawRandy Canis357Secure Electronic Voting ProtocolsHelger Lipmaa647Patent LawGerald Bluhm369Digital EvidenceRobin C. Stuart658Cyberlaw: The Major Areas, Development,and Information Security AspectsDennis M. Powers

CONTENTSDigital Watermarking and SteganographyM. A. Suhail, B. Sadoun, and M. S. Obaidat664Hacking Techniques in Wireless NetworksPrabhaker Mateti83Law Enforcement and Digital EvidenceJ. Philip Craiger, Jeff Swauger, and Mark Pollitt679Computer Viruses and WormsRobert Slade94Forensic ComputingMohamed Hamdi, Noureddine Boudriga,and Mohammad S. Obaidat702Trojan Horse ProgramsAdam L. Young107715Hoax Viruses and Virus AlertsRobert Slade119Computer Forensics, Procedures and MethodsJ. Philip CraigerHostile Java AppletsDavid Evans126750SpywareTom S. Chan136Forensic Analysis of UNIX SystemsDario V. Forte763Mobile Code and SecuritySong Fu and Cheng-Zhong Xu146Forensic Analysis of Windows SystemsSteve J. Chapin and Chester J. Maciag781Wireless Threats and AttacksRobert J. Boncella165Operating System SecurityWilliam Stallings796WEP SecurityNikita Borisov176UNIX SecurityMark Shacklette806Bluetooth SecuritySusanne Wetzel184Linux SecurityA. Justin Wilder822Cracking WEPPascal Meunier198OpenVMS SecurityRobert Gezelter853Denial of Service AttacksE. Eugene Schultz207Windows 2000 SecurityE. Eugene Schultz870Network AttacksEdward Amoroso220Software Development and Quality AssurancePascal Meunier885Fault AttacksHamid Choukri and Michael Tunstall230The Common Criteria/. McDermott897Side-Channel AttacksPankaj Rohatgi241Computer Forensics—Computer Media Reviewsin Classified Government AgenciesMichael R. AndersonVolume III: Threats, Vulnerabilities,Prevention, Detection, andManagementPart 2: Prevention: Keeping theHackers and Crackers at BayPart 1: Threats and Vulnerabilitiesto Information and ComputingInfrastructuresPhysical Security MeasuresMark Michael263RFID and SecurityStephen A. Weis289Cryptographic Privacy Protection TechniquesMarkus Jakobsson300Internal Security ThreatsMarcus K. Rogers3Physical Security ThreatsMark Michael18Cryptographic Hardware Security ModulesNicko van Someren311Fixed-Line Telephone System VulnerabilitiesMak Ming Tak, Xu Yan, and Zenith Y. W. Law30Smart Card SecurityMichael Tunstall, Sebastien Petit, and Stephanie Porte326E-Mail Threats and VulnerabilitiesDavid Harley40Client-Side SecurityCharles Border342E-Commerce VulnerabilitiesSviatoslav Braynov57Server-Side SecuritySlim Rekhis, Noureddine Boudriga, and M. S. Obaidat355Hacking Techniques in Wired NetworksQijun Gu, Peng Liu, and Chao-Hsien Chu70Protecting Web SitesDawn Alexander and April Giles370

CONTENTSxiiiDatabase SecurityMichael Gertz and Arnon Rosenthal380Part 3: Detection, Recovery,Management, and Policy ConsiderationsMedical Records SecurityNormand M. Martel395Intrusion Detection Systems BasicsPeng Ning and Sushil Jajodia685Access Control: Principles and SolutionsS. De Capitani di Vimercati, S. Paraboschi,and Pierangela Samarati406Host-Based Intrusion Detection SystemGiovanni Vigna and Christopher Kruegel701424Network-Based Intrusion Detection SystemsMarco Cremonini713Password AuthenticationJeremy L. RasmussenComputer and Network AuthenticationPatrick Me Daniel439Antivirus TechnologyMatthew Schmid450Contingency Planning ManagementMarco Cremonini and Pierangela SamaratiBiometric Basics and Biometric AuthenticationJames L. Wayman459Issues and Concerns in Biometric IT SecurityPhilip Statham471Computer Security Incident ResponseTeams (CSIRTs)Raymond R. PankoFirewall BasicsJames E. Goldman502Firewall ArchitecturesJames E. Goldman515Packet Filtering and Stateful FirewallsAvishai Wool526Proxy FirewallsJohn D. McLaren537E-Commerce SafeguardsMark S. Merkow552Digital Signatures and Electronic SignaturesRaymond R. Panko562Information Leakage: Detection andCountermeasuresPhil Venables571Digital Rights ManagementRenato Iannella865E-Mail SecurityJon Callas584Web HostingDoug Kaye879Security for ATM NetworksThomas D. Tarman596Managing a Network EnvironmentJian Ren893VPN BasicsG. I. Papadimitriou, M. S. Obaidat, C. Papazoglou,and A. S. PomportsisE-Mail and Internet Use PoliciesNancy J. King908VPN ArchitectureStan Kurkovsky612IP-Based VPNDavid E. McDysan624Ideatity ManagementJohn Linn636Security Policy GuidelinesMohamed Hamdi, Noureddine Boudriga,and M. S. Obaidat646Asset-Security Goals Continuum: A Processfor SecurityMargarita Maria LenkThe Use of Deception Techniques: Honeypotsand DecoysFred CohenActive Response to Computer IntrusionsDavid Dittrich and Kenneth Einar Himma664The Use of Agent Technology for IntrusionDetectionDipankar Dasgupta730744760Implementing a Security Awareness ProgramK. Rudolph766Risk Management for IT SecurityRick Kazman, Daniel N. Port, and David Klappholz786Security Insurance and Best PracticesSelahattin Kuru, Onur Ihsan Arsun, and Mustafa Yildiz811Auditing Information Systems SecurityS. Rao Vallabhaneni829Evidence Collection and Analysis ToolsChristopher L. T. Brown840Forward Security Adaptive Cryptography:Time EvolutionGene ItkisMultilevel SecurityRichard E. Smith853927945960972

xivCONTENTSMultilevel Security ModelsMark Stamp and All Hushyar987Security Policy EnforcementCynthia E. Irvine1026Security ArchitecturesNicole Graf and Dominic Kneeshaw998Guidelines for a Comprehensive Security SystemHossein Bidgoli1041Quality of Security Service: Adaptive SecurityTimothy E. Levin, Cynthia E. Irvine, and EvdoxiaSpyropoulou1016

Guide to the Handbook of Information Security xxvi Reviewers List 1051 Volume Index 1059 Volume I: Key Concepts, Infrastructure, Standards, and Protocols Part 1: Key Concepts and Applications Related to Information Security Internet Basics 3 Hossein Bidgoli Digital Economy 15 Nirvikar Sin

Related Documents:

HANDBOOK OF ROTORDYNAMICS Fredric R Ehrich Editor-in-Chief lnv.-Nr. . Systems with Planar Asymmetry / 1.113 1.7.5. Nonlinear Transmission Distortion / 7.777 1.8. Torsional and Longitudinal Vibration / 1.118 . Types of Balancing / 3.5 3.1.4. Instrumentation and Vibration Me

Section 1 Structural Analysis Parti. Fundamentals and Applications to Structural Frameworks 1-1 David A. Pecknold Introduction: Classification of Structures; Fundamentals of Analysis: Description of Structural Configuration—Basic Principles— Static Determinacy and Stability—Superpo-

Youth handbooks are the Lion Cub Handbook, Tiger Handbook, Wolf Handbook, Bear Handbook, and Webelos Handbook. An assortment of handbooks are available for adult leaders, including: Den Leader Guides Cub Scout Leader Handbook Cub Scout Leader How-To Handbook Visit www.scoutstuff.org or the Bloomington Scout Shop for more

FAA-H-8083-3 Airplane Flying Handbook FAA-H-8083-6 Advanced Avionics Handbook FAA-H-8083-9 Aviation Instructor's Handbook FAA-H-8083-15 Instrument Flying Handbook FAA-H-8083-16 Instrument Procedures Handbook FAA-H-8083-25 Pilot's Handbook of Aeronautical Knowledge FAA-H-8083-30 Aviation Maintenance Technician Handbook— General FAA-H-8083 .

Introducing Functional Grammar Third edition Geoff Thompson \ R Routledge Taylor & Francis Group . 2.1.2 Structural and functional labels 18 2.2 Ranks 21 Exercises 26 . 10.2 A summary review of Functional Grammar 262 10.3 Using Functional Grammar * 264 10.4 Closing 266

3.4 Symplectic Geometry 42 3.5 Cyclical Variables 46 3.6 Perturbation Theory 48 3.7 Keplerian Motion 49 jLecture 4. POINCARE 55 4.1 Liouvilie's Theorem, Measure-Preserving Transformations and Stochasti c Processes 55 4.2 The Kolmogorov-Arnold-Moser Theorem 59 4.3 The Example of H6non and Heiles 60 4.4 Chaos and Order 61 Suggested Additional .

1 Grundlagen und Schritte des Pflege-prozesses 125 Wahrnehme n - Beobachte Beur-teilen 135 Beraten - Schulen - Anleiten 142 Gefühlsarbeit 150 Einleitung 154 Pflegesysteme 155 9.2.1 Funktionelle Pflege 155 9.2.2 Ganzheitspflege 157 9.3 Modelle der Pflegeorganisation 159 9.3.1

universiteti mesdhetar orari i gjeneruar:10/14/2019 asc timetables lidership b10 i. hebovija 3deget e qeverisjes 203 s. demaliaj e drejte fiskale 204 a.alsula histori e mnd 1 b10 n. rama administrim publik 207 g. veshaj tdqe 1