Publisher's Brochure Including Ordering
Total Page:16
File Type:pdf, Size:1020Kb
The Definitive Resource on Information and Computer Security SPECIAL PRE-PUB OFFER! This definitive 3-volume Handbook offers coverage Individual volumes: $250 each of both established and cutting-edge theories through 1/31/06; $300 thereafter and developments on information and computer Three-volume set: $750 each through 1/31/06; $900 thereafter security. Among industries expected to become a increasingly dependent upon the information and computer security and active in understanding the many issues surrounding this important and fast growing field are: government agencies, military, education, libraries, health, medical, law enforcement, accounting firms, law firms, justice, manufacturing, financial services, insurance, communications, transportation, aerospace, energy, biotechnology and utilities. Volume I: Key Concepts, Infrastructure, Standards and Protocols Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations Volume III: Threats, Vulnerabilities, Prevention, Detection and Management Contents “The Handbook of Information Security EDITED BY HOSSEIN BIDGOLI, is...a must have reference!” —Donn B. Parker, CISSP, Author and retired CALIFORNIA STATE UNIVERSITY, Senior Information Systems Management Consultant BAKERSFIELD, CALIFORNIA CONTRIBUTORS FROM AROUND THE WORLD... Detailed Australia, Austria, Canada, China, reference guide France, Germany, Hungary, Italy, United Kingdom, United States Cutting-edge topics Illustrations throughout Chapter-at-a-glance for your convenience Easy-to-read typeface KEY FEATURES: ■ The Handbook provides researchers and managers with a ■ Includes more than 200 articles from over 200 leading experts. solid coverage of the core technologies and applications in ■ Each article follows a unique format including Title and the information security field. Author, Glossary, Abstract, Introduction, Body, Conclusion, ■ Articles in the Handbook have been rigorously peer-reviewed Cross-references, and Bibliography. This unique format assists by more than 1,000 experts chosen from around the world. the readers to pick and choose various sections of an article and also creates consistency throughout the entire series. Wireless Local Area Networks Digital Certificates Volume I: Key Concepts, Mohammad S. Obaidat Albert Levi Infrastructure, Standards and Protocols Monmouth University Sabanci University, Turkey G. I. Papadimitriou Internet E-Mail Architecture Aristotle University, Greece Robert Gezelter Part 1: Key Concepts Extranets: Applications, Digital Communication S. Obeidat Software Consultant and Applications Related Development, Security and Privacy Robert W. Heath Jr. Arizona State University PKI (Public Key Infrastructure) to Information Security Stephen W. Thorpe The University of Texas, Austin Security in Wireless Sensor Networks Radia Perlman Neumann College Atul A. Salvekar Mohamed Eltoweissy Sun Microsystems Laboratories Internet Basics Business-to-Business Intel Corporation Virginia Tech Hossein Bidgoli S/MIME (Secure MIME) Electronic Commerce William Bard Stephan Olariu California State University, Bakersfield Steven J. Greenwald Julian J. Ray The University of Texas, Austin Old Dominion University Independent Information Digital Economy University of Redlands Local Area Networks Ashraf Wadaa Security Consultant Nirvikar Singh Click-and-Brick Electronic Commerce Wayne C. Summers Old Dominion University University of California, Santa Cruz PGP (Pretty Good Privacy) Charles Steinfield Columbus State University Cellular Networks Stephen A. Weis Online Retail Banking: Security Michigan State University Wide Area and Metropolitan Area Jingyuan Zhang Massachusetts Institute of Technology Concerns, Breaches and Controls Mobile Commerce Networks The University of Alabama Kent Belasco SMTP (Simple Mail Transfer Protocol) Vijay Atluri Lynn A. DeNoia First Midwest Bank, Itasca, IL Ivan Stojmenovic Vladimir V. Riabov Rutgers University Rensselaer Polytechnic Institute University of Ottawa, Ottawa, Ontario Rivier College Siaw-Peng Wan Elmhurst College E-Education and Information Home Area Networking Mobile IP Internet Security Standards Privacy and Security Sherali Zeadally M. Farooque Mesiya Raymond R. Panko Digital Libraries: Security William K. Jackson Wayne State University Rensselaer Polytechnic Institute University of Hawaii, Manoa and Preservation Considerations Southern Oregon University Priya Kubher Cavan McCarthy IP Multicast and its Security Kerberos Wayne State University Louisiana State University Security in E-Learning Emilia Rosti William Stallings Edgar R. Weippl Nadeem Ansari Università degli Studi di Milano, Italy Independent Consultant E-Mail and Instant Messaging Vienna University of Technology, Wayne State University TCP over Wireless Links IPsec: AH (Authentication Header) Bhagyavati Vienna, Austria Columbus State University Public Network Technologies Mohsen Guizani and ESP (Encapsulating E-Government and Security Western Michigan University Security Payload) Internet Relay Chat Shannon Schelin Dale R. Thompson Amel Meddeb Paul L. Witt Anupama Raju The University of North Carolina, University of Arkansas Western Michigan University National Digital Certification Agency Texas Christian University Chapel Hill and University of Carthage, Tunisia Amy W. Apon Air-Interface Requirements Online Communities G. David Garson University of Arkansas for Mobile Data Services N. Boudriga Lee Sproull North Carolina State University National Digital Certification Agency New York University Client/Server Computing: Principles Harald Haas E-Government Security Issues and Security Considerations International University Bremen and University of Carthage, Tunisia Groupware: Risks, Threats and and Measures Daniel J. McFarland (IUB), Germany Mohammad S. Obaidat Vulnerabilities in the Internet Age William C. Barker Monmouth University Rowan University Wireless Internet Pierre Balthazard National Institute of Standards Abbas Jamalipour IPsec: IKE (Internet Key Exchange) Arizona State University and Technology Peer-to-Peer Security Allan Friedman University of Sydney, Australia Charlie Kaufman John Warren International Security Issues Microsoft Corporation Harvard University Security for Satellite Networks University of Texas, San Antonio of E-Government L. Jean Camp Michele Luglio Secure Sockets Layer (SSL) Karin Geiselhart Search Engines: Security, Privacy Harvard University University of Rome Tor Vergata, Italy Robert J. Boncella and Ethical Issues University of Canberra, Australia Washburn University Raymond Wisman Security Middleware Antonio Saitto Indiana University Southeast Part 2: Infrastructure for the Linda Volonino Telespazio, Italy PKCS (Public-Key Cryptography Internet, Computer Networks Canisius College Security of Broadband Standards) Web Services and Secure Information Transfer Richard P. Volonino Yongge Wang Akhil Sahai Access Networks Canisius College Peter L. Heinzmann University of North Carolina, Charlotte Hewlett-Packard Laboratories Conducted Communications Media Internet Architecture University of Applied Sciences, Secure Shell (SSH) Palo Alto, CA Thomas L. Pigg Graham Knight Eastern Switzerland Xukai Zou Sven Graupner Jackson State Community College Purdue University Hewlett-Packard Laboratories University College, London, UK Ad hoc Network Security Routers and Switches Palo Alto, CA TCP/IP Suite Pietro Michiardi Security and the Wireless Hans-Peter Dommel Institut Eurecom, France Application Protocol (WAP) Wooyoung Kim Prabhaker Mateti Santa Clara University Lillian N. Cassel University of Illinois, Wright State University Refik Molva Radio Frequency and Wireless Villanova University Urbana-Champaign Voice over Internet Protocol (VoIP) Institut Eurecom, France Communications Security Roy Morris Cynthia Pandolfo Electronic Commerce Okechukwu Ugweje Capitol College Part 3: Standards and Protocols Villanova University Charles Steinfield The University of Akron for Secure Information Transfer Michigan State University Security and Web Quality of Service Wireless Network Standards Wireless Channels Tarek F. Abdelzhaer Standards for Product Security and Protocol (802.11) EDI Security P. M. Shankar University of Virginia Assessment Prashant Krishnamurthy Matthew K. McGowan Drexel University University of Pittsburgh Bradley University Chengdu Huang István Zsolt Berta Security in Circuit, Message University of Virginia Budapest University of Technology P3P (Platform for Privacy Electronic Payment Systems and Packet Switching and Economics, Hungary Preferences Project) Indrajit Ray Robert H. Greenfield Mobile Devices and Protocols Levente Buttyán Lorrie Faith Cranor Colorado State University Computer Consulting Min Song Budapest University of Technology Carnegie Mellon University Old Dominion University Intranets: Principals, Privacy Daryle P. Niedermayer and Economics, Hungary and Security Considerations IBluetooth Technology CGI Group Inc. István Vajda William T. Schiano Brent A. Miller Budapest University of Technology Bentley College IBM Corporation and Economics, Hungary SPECIAL PRE-PUB OFFER! INDIVIDUAL VOLUMES $250 EACH THROUGH 1/31/06; $300 THEREAFTER Volume 1: Key Concepts, Infrastructure, Standards and Protocols (0-471-64830-2) THREE VOLUME SET $750 THROUGH 1/31/06; $900 THEREAFTER Volume 2: Information Warfare, Social, Legal, and International Issues and Security Foundations (0-471-64831-0) Handbook of Information Security, 3 volumes (0-471-64833-7) Volume 3: Threats, Vulnerabilities, Prevention, Detection and Management (0-471-64832-9)