Skip to content

Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations

Spend $50 to get a free DVD!

ISBN-10: 0471648310

ISBN-13: 9780471648314

Edition: 2006

Authors: Hossein Bidgoli

List price: $425.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


'The Handbook of Information Security' is a definitive three volume handbook offering coverage of both established & cutting-edge theories & developments on information & computer security. The text includes 180 articles from over 200 experts in the field.
Customers also bought

Book details

List price: $425.00
Copyright year: 2006
Publisher: John Wiley & Sons, Incorporated
Publication date: 1/3/2006
Binding: Hardcover
Pages: 1008
Size: 8.50" wide x 11.00" long x 2.00" tall
Weight: 5.412
Language: English

Hossein Bidgoli, Ph.D., is professor of Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC Lab in the United States and served as its first director. He is the author of 45 textbooks, 27 manuals and more than five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor-in-chief of THE HANDBOOK OF TECHNOLOGY MANAGEMENT, THE INTERNET ENCYCLOPEDIA, THE HANDBOOK OF INFORMATION SECURITY, THE HANDBOOK OF COMPUTER NETWORKS, and THE ENCYCLOPEDIA OF INFORMATION…    

Guide to the Handbook of Information Security
Information Warfare
Cybercrime and the U.S. Criminal Justice System
Cyberterrorism and Information Security
Online Stalking
Electronic Attacks
Wireless Information Warfare
Computer Network Operations (CNO)
Electronic Protection
Information Assurance
Social and Legal Issues
The Legal Implications of Information Security: Regulatory Compliance and Liability
Hackers, Crackers, and Computer Criminals
Corporate Spying: The Legal Aspects
Law Enforcement and Computer Security Threats and Measures
Combating the Cybercrime Threat: Developments in Global Law Enforcement
Digital Identity
Digital Divide
Legal, Social, and Ethical Issues of the Internet
Anonymity and Identity on the Internet
Spam and the Legal Counter Attacks
Cyberlaw: The Major Areas, Development, and Information Security Aspects
Global Aspects of Cyberlaw
Privacy Law and the Internet
Internet Censorship
Copyright Law
Patent Law
Trademark Law and the Internet
Online Contracts
Electronic Speech
Software Piracy
Internet Gambling
The Digital Millennium Copyright Act
Digital Courts, the Law and Evidence
Foundations of Information, Computer and Network Security
Encryption Basics
Symmetric Key Encryption
Data Encryption Standard (DES)
The Advanced Encryption Standard
Hashes and Message Digests
Number Theory for Information Security
Public Key Algorithms
Elliptic Curve Cryptography
IBE (Identity-Based Encryption)
Cryptographic Protocols
Quantum Cryptography
Key Lengths
Key Management
Secure Electronic Voting Protocols
Digital Evidence
Digital Watermarking and Steganography
Law Enforcement and Digital Evidence
Forensic Computing
Computer Forensics Procedures and Methods
Computer Forensics-Computer Media Reviews in Classified Government Agencies
Forensic Analysis of UNIX Systems
Forensic Analysis of Windows Systems
Operating System Security
UNIX Security
Linux Security
Open VMS Security
Windows 2000 Security
Software Development and Quality Assurance
The Common Criteria
Reviewers List
Volume Index