Limit search to available items
995 results found. Sorted by relevance | date | title .
Book Cover
E-book

Title Handbook of information security . Volume 1, Key concepts, infrastructure, standards, and protocols / Hossein Bidgoli, editor-in-chief
Published Hoboken, N.J. : John Wiley, ©2006

Copies

Description 1 online resource (xxvii, 1092 pages) : illustrations
Contents Cover -- Contents -- Preface -- Guide to The Handbook of Information Security -- PART 1: Key Concepts and Applications Related to Information Security -- Internet Basics -- INTRODUCTION -- INFORMATION SUPERHIGHWAY AND THE WORLD WIDE WEB -- DOMAIN NAME SYSTEMS -- NAVIGATIONAL TOOLS, SEARCH ENGINES, AND DIRECTORIES -- INTERNET SERVICES THAT SUPPORT ELECTRONIC COMMERCE -- WHAT IS AN INTRANET? -- INTERNET VERSUS INTRANETS -- SELECTED APPLICATIONS OF AN INTRANET -- WHAT IS AN EXTRANET? -- SELECTED INTERNET APPLICATIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Economy -- INTRODUCTION -- INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE -- SIZE AND GROWTH OF THE DIGITAL ECONOMY -- IMPLICATIONS FOR MARKETS AND ORGANIZATIONS -- SECURITY -- GOVERNMENT POLICIES -- WORK, PLAY, AND COMMUNITIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Retail Banking: Security Concerns, Breaches, and Controls -- INTRODUCTION -- TYPES OF ONLINE RETAIL BANKING SERVICES -- ONLINE BANKING SECURITY CONCERNS -- DEFINITION OF SECURITY -- SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES -- SOURCES AND CONTROLS OF INTERNAL INFORMATION SECURITY BREACHES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Digital Libraries: Security and Preservation Considerations -- INTRODUCTION -- CONSTRUCTING DIGITAL LIBRARIES -- SECURITY AND DIGITAL LIBRARIES -- PRESERVATION AND DIGITAL LIBRARIES -- CONTINUITY OF DIGITAL LIBRARIES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- E-Mail and Instant Messaging -- INTRODUCTION -- ELECTRONIC MAIL -- INSTANT MESSAGING -- SECURITY IN E-MAIL AND IM ENVIRONMENTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Internet Relay Chat -- SECURE COMMUNICATION USING INTERNET RELAY CHAT -- STRUCTURE AND OPERATION -- SOCIAL FACTORS -- SECURITY AND LEGAL ISSUES -- FUTURE OF IRC -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Online Communities -- INTRODUCTION -- DEFINITION AND ATTRIBUTES -- HISTORY OF ONLINE COMMUNITIES -- TYPES OF ONLINE COMMUNITIES -- ONLINE COMMUNITY CONSEQUENCES -- RESEARCH METHODS AND ISSUES -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Groupware: Risks, Threats, and Vulnerabilities in the Internet Age -- INTRODUCTION -- WHY GROUPWARE? -- GROUPWARE AND SECURITY -- DEFINING AND CLASSIFYING GROUPWARE IN THE INTERNET AGE -- GROUPWARE FUNCTIONALITIES IN THE INTERNET AGE -- GROUPWARE MANAGEMENT ISSUES: PRODUCTIVITY AND ORGANIZATIONAL EFFECTS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Search Engines: Security, Privacy, and Ethical Issues -- INTRODUCTION -- SEARCHER -- SEARCH ENGINE -- WEB SITE -- SEARCH ETHICS -- CONCLUSION -- GLOSS
Summary The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare
Bibliography Includes bibliographical references and indexes
Notes Print version record
Subject Computer networks -- Security measures.
Home computer networks.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer networks -- Security measures
Home computer networks
Form Electronic book
Author Bidgoli, Hossein.
LC no. 2005006851
ISBN 9780470051191
0470051191
128040938X
9781280409387
Other Titles Key concepts, infrastructure, standards, and protocols