Bilginin Adresi Ana Sayfa
Forum Anasayfası Forum Anasayfası > Yaþama Dair > Elektronik Kitap & E-Book
  Aktif Konular Aktif Konular RSS - Hossein Bidgoli : Handbook of Information Security. Volume 2
  SSS SSS  Forumu Ara   Events   Kayıt Ol Kayıt Ol  GiriÅŸ GiriÅŸ

Hossein Bidgoli : Handbook of Information Security. Volume 2

 Yanıt Yaz Yanıt Yaz
Yazar
Mesaj
invertor Açılır Kutu Gör
Security Professional
Security Professional
Simge
Ýnventor

Kayıt Tarihi: 18-01-2008
Status: Aktif DeÄŸil
Points: 3365
Mesaj Seçenekleri Mesaj Seçenekleri   Thanks (0) Thanks(0)   Alıntı invertor Alıntı  Yanıt YazCevapla Mesajın Direkt Linki Konu: Hossein Bidgoli : Handbook of Information Security. Volume 2
    Gönderim Zamanı: 08-12-2008 Saat 18:43
 
Hossein Bidgoli : Handbook of Information Security. Volume 2
1008 Pages | PDF | Wiley (2006-01-03) | ISBN: 0471648310 | 10Mb

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

It would be a daunting task to put together a book to cover all areas of information security into a single, comprehensive reference work. Perhaps that is why it has not been done. Until now. On December 30, 2006, John Wiley and Sons will release the Handbook of Information Security (2005, Edited by Hossein Bidgoli et al, 3366 pages). With contributions from 240 contributors and extensive peer review by over 1,000 others, this book should be the definitive reference manual that sits in the office of every information technology auditor, as well as every information technology security professional who needs information without extensive digging. In fact this three volume set might easily replace many other security titles that have not been through as extensive a peer review process.

This is not to say that information may quickly become dated as technology evolves (and as I found in one section on instant messaging). This being said, this initial review will provide an overview and synopsis of Volume I: Key Concepts, Infrastructure, Standards, and Protocols.

Volume I is broken down into three parts, as follows:

Part 1: Key Concepts and Applications Related to Information Security

* Internet Basics
* Digital Economy
* Online Retail Banking: Security Concerns, Breaches , and Controls
* E-Mail and Instant Messaging
* Internet Relay Chat
* Online Communities
* Groupware: Risks, Threats, and Vulnerabilities In The Internet Age
* Search Engines: Security, Privacy, and Ethical Issues
* Web Services
* Electronic Commerce
* EDI Security
* Electronic Payment Systems
* Intranets: Principles, Privacy, and Security Considerations
* Extranets: Applications. Development, Security, and Privacy
* Business-to-Business Electronic Commerce
* Click-and-Brick Electronic Commerce
* Mobile Commerce
* E-Education and Information Privacy and Security
* Security in E-Learning
* E-Government
* E-Government Security Issues and Measures
* International Security Issues of E-Government

Part 2: Infrastructure for the Internet, Computer Networks, and Secure Information Transfer

* Conducted Communication Media
* Routers and Switches
* Radio Frequency and Wireless Communications Security
* Wireless Channels
* Security in Circuit, Message, and Packet Switching
* Digital Communication
* Local Area Networks
* Wide Area and Metropolitan Area Networks
* Home Area Networking
* Public Network Technologies and Security
* Client/Server Computing: Principles and Security Considerations
* Peer-to-Peer Security
* Security Middleware
* Internet Architecture
* TCP/IP Suite
* Voice-over Internet Protocol (VoIP)
* Security and Web Quality of Service
* Mobile Devices and Protocols
* Bluetooth Technology
* Wireless Local Area Networks
* Security in Wireless Sensor Networks
* Cellular Networks
* Mobile IP
* IP Multicast and Its Security
* TCP over Wireless Networks
* Air Interface Requirements for Mobile Data Services
* Wireless Internet: A cellular Perspective
* Security of Satellite Networks
* Ad Hoc Network Security


Part 3: Standards and Protocols for Secure Information Transfer

* Standards for Product Security Assessment
* Digital Certificates
* Internet E-Mail Architecture
* PKI (Public Key Infrastructure)
* S/MIME (Secure MIME)
* PGP (Pretty Good Privacy)
* SMTP (Simple Mail Transfer Protocol)
* Internet Security Standards
* Kerberos
* IPsec: AH and ESP
* IPsec: IKE (Internet Key Exchange)
* Secure Sockets Layer (SSL)
* PKCS (Public Key Cryptography Standards
* Public Key Standards: Secure Shell
* Security and the Wireless Application Protocol
* Wireless Network Standards and Protocol (802.11)
* P3P (Platform for Privacy Preferences Project

Yukarı Dön
 Yanıt Yaz Yanıt Yaz

Forum Atla Forum İzinleri Açılır Kutu Gör



Bu Sayfa 0.227 Saniyede Yüklendi.