ISBN-10:
0471648302
ISBN-13:
9780471648307
Pub. Date:
01/03/2006
Publisher:
Wiley
Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols / Edition 1

Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols / Edition 1

by Hossein Bidgoli

Hardcover

Current price is , Original price is $405.0. You

Temporarily Out of Stock Online

Please check back later for updated availability.

Product Details

ISBN-13: 9780471648307
Publisher: Wiley
Publication date: 01/03/2006
Series: Handbook of Information Security Series
Edition description: Volume 1
Pages: 1120
Product dimensions: 8.70(w) x 11.02(h) x 2.50(d)

About the Author

Hossein Bidgoli, Ph.D., is professor Management Information Systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States. he is the author of 43 textbooks, 27 manuals and over five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor -in-chief of the Internet Encyclopedia and the Encyclopedia of Information Systems. The Encyclopedia of Information Systems.

The Encyclopedia of Information Systems was the recipient of one of the Library Journal's Best Reference Sources for 2002 and The Internet Encyclopedia  was recipient of one of the PSP Awards (Professional and Scholarly Publishing), 2004. Dr. Bidgoli was selected as the California State University, Bakersfield's 2001-2002 Professor of the Year.

Table of Contents

VOLUME I: KEY CONCEPTS, INFRASTRUCTURE, STANDARDS, AND PROTOCOLS.

Part 1: Key Concepts and Applications related to Information Security.

Part 2: Infrastructure for the Internet, Computer Networks, and Secure Information Transfer.

Part 3: Standards and Protocols for Secure Information Transfer.

VOLUME II: INFORMATION WARFARE; SOCIAL, LEGAL, AND INTERNATIONAL ISSUES; AND SECURITY FOUNDATIONS.

Part 1: Information Warfare.

Part 2: Social and Legal Issues.

Part 3: Foundations of Information, Computer and Network Security.

VOLUME III: THREATS, VULNERABILITIES, PREVENTION, DETECTION, AND MANAGEMENT.

Part 1: Threats, Vulnerabilities, Prevention, Detection, and Management.

Part 2: Prevention: Keeping the Hackers and Crackers at Bay.

Part 3: Detection, Recovery, Management, and Policy Considerations.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews