Description |
xxxv, 858 pages : illustrations ; 24 cm |
Contents |
Foreword / William E. Baugh, Jr. -- Foreword / Arthur W. Coviello, Jr. -- Pt. 1. Digital Espionage, Warfare, and Information Security (INFOSEC). Ch. 1. Introduction to Digital Espionage. Ch. 2. Foundations of Information Security (INFOSEC) -- Pt. 2. INFOSEC Concepts. Ch. 3. Risk Management and Architecture of Information Security (INFOSEC). Ch. 4. Information Security Policy. Ch. 5. Privacy in a Knowledge-Based Economy. Ch. 6. Security Verification of Systems and Networks -- Pt. 3. Practical Countermeasures. Ch. 7. Cryptography. Ch. 8. Access Controls - Two Views. Ch. 9. Digital Signatures and Certification Authorities - Technology, Policy, and Legal Issues. Ch. 10. Permissions Management: Identification, Authentication, and Authorization (PMIAA). Ch. 11. Virtual Private Networks. Ch. 12. Biometric Countermeasures -- Pt. 4. Enterprise Continuity Planning. Ch. 13. Before the Attack: Protect and Detect. Ch. 14. During and After the Attack Special Consideration - The Web Server |
|
Pt. 5. Order of Battle. Ch. 15. The Big Picture. Ch. 16. Information Warfare. Ch. 17. Information Warfare Weapons, Intelligence, and the Cyberspace Environment. Ch. 18. Methods of Employment. Ch. 19. Public Key Infrastructure: Building Trust Online. Ch. 20. Cryptography Politics: Encryption Export Law and its Impact on U.S. Industry -- App. A. The Information Technology Revolution -- App. B. Definitions of Electronic Signatures in Enacted State Legislation -- App. C. Enacted Legislation Authorizing the Use of Elecronic Signatures -- App. D. Policy Initiatives - United States -- App. E. International - 35 Countries and Political Entities Enact Digital Signature Legislation -- App. F. Bernstein and the Encryption Debate -- App. G. VPN Comparisons -- App. H. Liability of Certificate Authorities Provisions Relating to Liability of Certification Authorities in States that Have Enacted Legislation |
Summary |
"This book offers what no other book can: a guide to defending your digital assets against all manner of threats, whatever their motivation or source. The ideas and strategies contained in this book are essential to anyone managing valuable data on a network."--BOOK JACKET |
Bibliography |
Includes bibliographical references (pages 817-842) and index |
Subject |
Digital signatures -- Law and legislation -- United States.
|
|
Digital signatures.
|
|
Computer security -- United States.
|
|
Computer crimes -- United States.
|
|
Data encryption (Computer science)
|
|
Cryptography.
|
Author |
Ryan, Daniel J.
|
|
Ryan, Julie J. C. H.
|
LC no. |
99059788 |
ISBN |
0072122854 |
|