Bilginin Adresi Homepage
Forum Home Forum Home > Yaşama Dair > Elektronik Kitap & E-Book
  New Posts New Posts
  FAQ FAQ  Forum Search   Register Register  Login Login

REKLAM ALANI

El dokuma Konya Kilim, Kayseri Kilim, Antik Milas Halı, Antik Yörük Kilim, Hint Kilim

Konya Kilimleri Kayseri Kimleri Yörük İran ve Antika Kilimler Hint Kilimleri

Yeni ve 2. El İnşaat Yapı Malzemeleri

Masa iskele, Beton Paspayı, Kalıpaltı iskele, Güvenlikli iskele

Fayer İnşaat Ergenekon İnşaat


Hossein Bidgoli : Handbook of Information Security. Volume 3

 Post Reply Post Reply
Author
Message
invertor View Drop Down
Security Professional
Security Professional
Avatar
İnventor

Joined: 18-01-2008
Status: Offline
Points: 3324
Post Options Post Options   Thanks (0) Thanks(0)   Quote invertor Quote  Post ReplyReply Direct Link To This Post Topic: Hossein Bidgoli : Handbook of Information Security. Volume 3
    Posted: 08-12-2008 at 18:42
 
Hossein Bidgoli : Handbook of Information Security, Threats,
Vulnerabilities, Prevention, Detection, and Management (Handbook of Information Security) Vol. 3.
1152 Pages | PDF | Wiley (2006-01-03) | ISBN: 0471648329 | 10Mb

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.


Part 1: Key Concepts and Applications Related to Information Security

* Internet Basics
* Digital Economy
* Online Retail Banking: Security Concerns, Breaches , and Controls
* E-Mail and Instant Messaging
* Internet Relay Chat
* Online Communities
* Groupware: Risks, Threats, and Vulnerabilities In The Internet Age
* Search Engines: Security, Privacy, and Ethical Issues
* Web Services
* Electronic Commerce
* EDI Security
* Electronic Payment Systems
* Intranets: Principles, Privacy, and Security Considerations
* Extranets: Applications. Development, Security, and Privacy
* Business-to-Business Electronic Commerce
* Click-and-Brick Electronic Commerce
* Mobile Commerce
* E-Education and Information Privacy and Security
* Security in E-Learning
* E-Government
* E-Government Security Issues and Measures
* International Security Issues of E-Government

Part 2: Infrastructure for the Internet, Computer Networks, and Secure Information Transfer

* Conducted Communication Media
* Routers and Switches
* Radio Frequency and Wireless Communications Security
* Wireless Channels
* Security in Circuit, Message, and Packet Switching
* Digital Communication
* Local Area Networks
* Wide Area and Metropolitan Area Networks
* Home Area Networking
* Public Network Technologies and Security
* Client/Server Computing: Principles and Security Considerations
* Peer-to-Peer Security
* Security Middleware
* Internet Architecture
* TCP/IP Suite
* Voice-over Internet Protocol (VoIP)
* Security and Web Quality of Service
* Mobile Devices and Protocols
* Bluetooth Technology
* Wireless Local Area Networks
* Security in Wireless Sensor Networks
* Cellular Networks
* Mobile IP
* IP Multicast and Its Security
* TCP over Wireless Networks
* Air Interface Requirements for Mobile Data Services
* Wireless Internet: A cellular Perspective
* Security of Satellite Networks
* Ad Hoc Network Security


Part 3: Standards and Protocols for Secure Information Transfer

* Standards for Product Security Assessment
* Digital Certificates
* Internet E-Mail Architecture
* PKI (Public Key Infrastructure)
* S/MIME (Secure MIME)
* PGP (Pretty Good Privacy)
* SMTP (Simple Mail Transfer Protocol)
* Internet Security Standards
* Kerberos
* IPsec: AH and ESP
* IPsec: IKE (Internet Key Exchange)
* Secure Sockets Layer (SSL)
* PKCS (Public Key Cryptography Standards
* Public Key Standards: Secure Shell
* Security and the Wireless Application Protocol
* Wireless Network Standards and Protocol (802.11)
* P3P (Platform for Privacy Preferences Project



Download
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down



This page was generated in 0.482 seconds.