07 December, 2008

Hossein Bidgoli : Handbook of Information Security. Volume 3

Part 1: Key Concepts and Applications Related to Information Security

* Internet Basics
* Digital Economy
* Online Retail Banking: Security Concerns, Breaches , and Controls
* E-Mail and Instant Messaging
* Internet Relay Chat
* Online Communities
* Groupware: Risks, Threats, and Vulnerabilities In The Internet Age
* Search Engines: Security, Privacy, and Ethical Issues
* Web Services
* Electronic Commerce
* EDI Security
* Electronic Payment Systems
* Intranets: Principles, Privacy, and Security Considerations
* Extranets: Applications. Development, Security, and Privacy
* Business-to-Business Electronic Commerce
* Click-and-Brick Electronic Commerce
* Mobile Commerce
* E-Education and Information Privacy and Security
* Security in E-Learning
* E-Government
* E-Government Security Issues and Measures
* International Security Issues of E-Government


Part 2: Infrastructure for the Internet, Computer Networks, and Secure Information Transfer

* Conducted Communication Media
* Routers and Switches
* Radio Frequency and Wireless Communications Security
* Wireless Channels
* Security in Circuit, Message, and Packet Switching
* Digital Communication
* Local Area Networks
* Wide Area and Metropolitan Area Networks
* Home Area Networking
* Public Network Technologies and Security
* Client/Server Computing: Principles and Security Considerations
* Peer-to-Peer Security
* Security Middleware
* Internet Architecture
* TCP/IP Suite
* Voice-over Internet Protocol (VoIP)
* Security and Web Quality of Service
* Mobile Devices and Protocols
* Bluetooth Technology
* Wireless Local Area Networks
* Security in Wireless Sensor Networks
* Cellular Networks
* Mobile IP
* IP Multicast and Its Security
* TCP over Wireless Networks
* Air Interface Requirements for Mobile Data Services
* Wireless Internet: A cellular Perspective
* Security of Satellite Networks
* Ad Hoc Network Security


Part 3: Standards and Protocols for Secure Information Transfer

* Standards for Product Security Assessment
* Digital Certificates
* Internet E-Mail Architecture
* PKI (Public Key Infrastructure)
* S/MIME (Secure MIME)
* PGP (Pretty Good Privacy)
* SMTP (Simple Mail Transfer Protocol)
* Internet Security Standards
* Kerberos
* IPsec: AH and ESP
* IPsec: IKE (Internet Key Exchange)
* Secure Sockets Layer (SSL)
* PKCS (Public Key Cryptography Standards
* Public Key Standards: Secure Shell
* Security and the Wireless Application Protocol
* Wireless Network Standards and Protocol (802.11)
* P3P (Platform for Privacy Preferences Project

Download:

Volume_1
Volume_2
Volume_3
.

No comments:

Post a Comment