| |
| |
Contributors | |
| |
| |
Preface | |
| |
| |
Guide to the Handbook of Information Security | |
| |
| |
| |
Information Warfare | |
| |
| |
Cybercrime and the U.S. Criminal Justice System | |
| |
| |
| |
Cyberterrorism and Information Security | |
| |
| |
| |
Online Stalking | |
| |
| |
| |
Electronic Attacks | |
| |
| |
| |
Wireless Information Warfare | |
| |
| |
| |
Computer Network Operations (CNO) | |
| |
| |
| |
Electronic Protection | |
| |
| |
| |
Information Assurance | |
| |
| |
| |
| |
Social and Legal Issues | |
| |
| |
The Legal Implications of Information Security: Regulatory Compliance and Liability | |
| |
| |
| |
Hackers, Crackers, and Computer Criminals | |
| |
| |
| |
Hacktivism | |
| |
| |
| |
Corporate Spying: The Legal Aspects | |
| |
| |
| |
Law Enforcement and Computer Security Threats and Measures | |
| |
| |
| |
Combating the Cybercrime Threat: Developments in Global Law Enforcement | |
| |
| |
| |
Digital Identity | |
| |
| |
| |
Digital Divide | |
| |
| |
| |
Legal, Social, and Ethical Issues of the Internet | |
| |
| |
| |
Anonymity and Identity on the Internet | |
| |
| |
| |
Spam and the Legal Counter Attacks | |
| |
| |
| |
Cyberlaw: The Major Areas, Development, and Information Security Aspects | |
| |
| |
| |
Global Aspects of Cyberlaw | |
| |
| |
| |
Privacy Law and the Internet | |
| |
| |
| |
Internet Censorship | |
| |
| |
| |
Copyright Law | |
| |
| |
| |
Patent Law | |
| |
| |
| |
Trademark Law and the Internet | |
| |
| |
| |
Online Contracts | |
| |
| |
| |
Electronic Speech | |
| |
| |
| |
Software Piracy | |
| |
| |
| |
Internet Gambling | |
| |
| |
| |
The Digital Millennium Copyright Act | |
| |
| |
| |
Digital Courts, the Law and Evidence | |
| |
| |
| |
| |
Foundations of Information, Computer and Network Security | |
| |
| |
Encryption Basics | |
| |
| |
| |
Symmetric Key Encryption | |
| |
| |
| |
Data Encryption Standard (DES) | |
| |
| |
| |
The Advanced Encryption Standard | |
| |
| |
| |
Hashes and Message Digests | |
| |
| |
| |
Number Theory for Information Security | |
| |
| |
| |
Public Key Algorithms | |
| |
| |
| |
Elliptic Curve Cryptography | |
| |
| |
| |
IBE (Identity-Based Encryption) | |
| |
| |
| |
Cryptographic Protocols | |
| |
| |
| |
Quantum Cryptography | |
| |
| |
| |
Key Lengths | |
| |
| |
| |
Key Management | |
| |
| |
| |
Secure Electronic Voting Protocols | |
| |
| |
| |
Digital Evidence | |
| |
| |
| |
Digital Watermarking and Steganography | |
| |
| |
| |
Law Enforcement and Digital Evidence | |
| |
| |
| |
Forensic Computing | |
| |
| |
| |
Computer Forensics Procedures and Methods | |
| |
| |
| |
Computer Forensics-Computer Media Reviews in Classified Government Agencies | |
| |
| |
| |
Forensic Analysis of UNIX Systems | |
| |
| |
| |
Forensic Analysis of Windows Systems | |
| |
| |
| |
Operating System Security | |
| |
| |
| |
UNIX Security | |
| |
| |
| |
Linux Security | |
| |
| |
| |
Open VMS Security | |
| |
| |
| |
Windows 2000 Security | |
| |
| |
| |
Software Development and Quality Assurance | |
| |
| |
| |
The Common Criteria | |
| |
| |
| |
Reviewers List | |
| |
| |
Volume Index | |