The Definitive Resource on Information and Computer Security

SPECIAL PRE-PUB OFFER! This definitive 3-volume Handbook offers coverage Individual volumes: $250 each of both established and cutting-edge theories through 1/31/06; $300 thereafter and developments on information and computer Three-volume set: $750 each through 1/31/06; $900 thereafter security. Among industries expected to become a increasingly dependent upon the information and computer security and active in understanding the many issues surrounding this important and fast growing field are: government agencies, military, education, libraries, health, medical, law enforcement, accounting firms, law firms, justice, manufacturing, financial services, insurance, communications, transportation, aerospace, energy, biotechnology and utilities.

Volume I: Key Concepts, Infrastructure, Standards and Protocols Volume II: Information Warfare, Social, Legal, and International Issues and Security Foundations Volume III: Threats, Vulnerabilities, Prevention, Detection and Management Contents

“The Handbook of Information Security EDITED BY HOSSEIN BIDGOLI, is...a must have reference!” —Donn B. Parker, CISSP, Author and retired CALIFORNIA STATE UNIVERSITY, Senior Information Systems Management Consultant BAKERSFIELD, CALIFORNIA CONTRIBUTORS FROM AROUND THE WORLD... Detailed Australia, Austria, Canada, China, reference guide France, Germany, Hungary, Italy, United Kingdom,

Cutting-edge topics

Illustrations throughout

Chapter-at-a-glance for your convenience Easy-to-read typeface

KEY FEATURES: ■ The Handbook provides researchers and managers with a ■ Includes more than 200 articles from over 200 leading experts. solid coverage of the core technologies and applications in ■ Each article follows a unique format including Title and the information security field. Author, Glossary, Abstract, Introduction, Body, Conclusion, ■ Articles in the Handbook have been rigorously peer-reviewed Cross-references, and Bibliography. This unique format assists by more than 1,000 experts chosen from around the world. the readers to pick and choose various sections of an article and also creates consistency throughout the entire series. Wireless Local Area Networks Digital Certificates Volume I: Key Concepts, Mohammad S. Obaidat Albert Levi Infrastructure, Standards and Protocols Monmouth University Sabanci University, Turkey G. I. Papadimitriou Internet E-Mail Architecture Aristotle University, Greece Robert Gezelter Part 1: Key Concepts Extranets: Applications, Digital Communication S. Obeidat Software Consultant and Applications Related Development, Security and Privacy Robert W. Heath Jr. Arizona State University PKI (Public Key Infrastructure) to Information Security Stephen W. Thorpe The University of Texas, Austin Security in Wireless Sensor Networks Radia Perlman Neumann College Atul A. Salvekar Mohamed Eltoweissy Sun Microsystems Laboratories Internet Basics Business-to-Business Intel Corporation Tech Hossein Bidgoli S/MIME (Secure MIME) Electronic Commerce William Bard Stephan Olariu California State University, Bakersfield Steven J. Greenwald Julian J. Ray The University of Texas, Austin Old Dominion University Independent Information Digital Economy University of Redlands Local Area Networks Ashraf Wadaa Security Consultant Nirvikar Singh Click-and-Brick Electronic Commerce Wayne C. Summers Old Dominion University University of California, Santa Cruz PGP (Pretty Good Privacy) Charles Steinfield Columbus State University Cellular Networks Stephen A. Weis Online Retail Banking: Security Michigan State University Wide Area and Metropolitan Area Jingyuan Zhang Massachusetts Institute of Technology Concerns, Breaches and Controls Mobile Commerce Networks The University of Alabama Kent Belasco SMTP (Simple Mail Transfer Protocol) Vijay Atluri Lynn A. DeNoia First Midwest Bank, Itasca, IL Ivan Stojmenovic Vladimir V. Riabov Rutgers University Rensselaer Polytechnic Institute University of Ottawa, Ottawa, Ontario Rivier College Siaw-Peng Wan Elmhurst College E-Education and Information Home Area Networking Mobile IP Internet Security Standards Privacy and Security Sherali Zeadally M. Farooque Mesiya Raymond R. Panko Digital Libraries: Security William K. Jackson Wayne State University Rensselaer Polytechnic Institute University of Hawaii, Manoa and Preservation Considerations Southern Oregon University Priya Kubher Cavan McCarthy IP Multicast and its Security Kerberos Wayne State University Louisiana State University Security in E-Learning Emilia Rosti William Stallings Edgar R. Weippl Nadeem Ansari Università degli Studi di Milano, Italy Independent Consultant E-Mail and Instant Messaging Vienna University of Technology, Wayne State University TCP over Wireless Links IPsec: AH (Authentication Header) Bhagyavati Vienna, Austria Columbus State University Public Network Technologies Mohsen Guizani and ESP (Encapsulating E-Government and Security Western Michigan University Security Payload) Internet Relay Chat Shannon Schelin Dale R. Thompson Amel Meddeb Paul L. Witt Anupama Raju The University of North Carolina, University of Arkansas Western Michigan University National Digital Certification Agency Texas Christian University Chapel Hill and University of Carthage, Tunisia Amy W. Apon Air-Interface Requirements Online Communities G. David Garson University of Arkansas for Mobile Data Services N. Boudriga Lee Sproull North Carolina State University National Digital Certification Agency New York University Client/Server Computing: Principles Harald Haas E-Government Security Issues and Security Considerations International University Bremen and University of Carthage, Tunisia Groupware: Risks, Threats and and Measures Daniel J. McFarland (IUB), Germany Mohammad S. Obaidat Vulnerabilities in the Internet Age William C. Barker Monmouth University Rowan University Wireless Internet Pierre Balthazard National Institute of Standards Abbas Jamalipour IPsec: IKE (Internet Key Exchange) Arizona State University and Technology Peer-to-Peer Security Allan Friedman University of Sydney, Australia Charlie Kaufman John Warren International Security Issues Corporation Harvard University Security for Satellite Networks University of Texas, San Antonio of E-Government L. Jean Camp Michele Luglio Secure Sockets Layer (SSL) Karin Geiselhart Search Engines: Security, Privacy Harvard University University of Rome Tor Vergata, Italy Robert J. Boncella and Ethical Issues University of Canberra, Australia Washburn University Raymond Wisman Security Middleware Antonio Saitto Indiana University Southeast Part 2: Infrastructure for the Linda Volonino Telespazio, Italy PKCS (Public-Key Cryptography Internet, Computer Networks Canisius College Security of Broadband Standards) Web Services and Secure Information Transfer Richard P. Volonino Yongge Wang Akhil Sahai Access Networks Canisius College Peter L. Heinzmann University of North Carolina, Charlotte Hewlett-Packard Laboratories Conducted Communications Media Internet Architecture University of Applied Sciences, Secure Shell (SSH) Palo Alto, CA Thomas L. Pigg Graham Knight Eastern Switzerland Xukai Zou Sven Graupner Jackson State Community College Purdue University Hewlett-Packard Laboratories University College, London, UK Ad hoc Network Security Routers and Switches Palo Alto, CA TCP/IP Suite Pietro Michiardi Security and the Wireless Hans-Peter Dommel Institut Eurecom, France Application Protocol (WAP) Wooyoung Kim Prabhaker Mateti Santa Clara University Lillian N. Cassel University of Illinois, Wright State University Refik Molva Radio Frequency and Wireless Villanova University Urbana-Champaign Voice over Internet Protocol (VoIP) Institut Eurecom, France Communications Security Roy Morris Cynthia Pandolfo Electronic Commerce Okechukwu Ugweje Capitol College Part 3: Standards and Protocols Villanova University Charles Steinfield The University of Akron for Secure Information Transfer Michigan State University Security and Web Quality of Service Wireless Network Standards Wireless Channels Tarek F. Abdelzhaer Standards for Product Security and Protocol (802.11) EDI Security P. M. Shankar University of Virginia Assessment Prashant Krishnamurthy Matthew K. McGowan Drexel University University of Pittsburgh Bradley University Chengdu Huang István Zsolt Berta Security in Circuit, Message University of Virginia Budapest University of Technology P3P (Platform for Privacy Electronic Payment Systems and Packet Switching and Economics, Hungary Preferences Project) Indrajit Ray Robert H. Greenfield Mobile Devices and Protocols Levente Buttyán Lorrie Faith Cranor Colorado State University Computer Consulting Min Song Budapest University of Technology Carnegie Mellon University Old Dominion University Intranets: Principals, Privacy Daryle P. Niedermayer and Economics, Hungary and Security Considerations IBluetooth Technology CGI Group Inc. István Vajda William T. Schiano Brent A. Miller Budapest University of Technology Bentley College IBM Corporation and Economics, Hungary

SPECIAL PRE-PUB OFFER! INDIVIDUAL VOLUMES $250 EACH THROUGH 1/31/06; $300 THEREAFTER Volume 1: Key Concepts, Infrastructure, Standards and Protocols (0-471-64830-2) THREE VOLUME SET $750 THROUGH 1/31/06; $900 THEREAFTER Volume 2: Information Warfare, Social, Legal, and International Issues and Security Foundations (0-471-64831-0) Handbook of Information Security, 3 volumes (0-471-64833-7) Volume 3: Threats, Vulnerabilities, Prevention, Detection and Management (0-471-64832-9) Hashes and Message Digests Forensic Computing Volume II: Information Warfare, Social, Legal, Magnus Daumand Mohamed Hamdi and International Issues and Security Foundations Ruhr University Bochum, Germany National Digital Certification Hans Dobbertin Agency, Tunisia Ruhr University Bochum, Germany Noureddine Boudriga Part 1: Information Warfare Hacktivism Privacy Law and the Internet Number Theory National Digital Certification Paul A. Taylor Ray Everett-Church for Information Security Agency, Tunisia Cybercrime and the U.S. Criminal University of Leeds, UK PrivacyClue LLC Duncan A. Buell Mohammad S. Obaidat Monmouth University Justice System Jan Li. Harris Internet Censorship University of South Carolina Susan W. Brenner Salford University, UK Richard A. Spinello Public-Key Algorithms Computer Forensic Procedures University of Dayton Corporate Spying: Boston College Bradley S. Rubin and Methods Cyberterrorism and The Legal Aspects University of St. Thomas J. Philip Craiger Copyright Law University of Central Information Security William A. Zucker Randy Canis Elliptic Curve Cryptography Charles Jaeger Gadsby Hannah LLP Greensfelder, Hemker & Gale, P.C. Nigel Smart Computer Forensics: Computer Southern Oregon University Scott Nathan University of Bristol, UK Media Reviews in Classified Patent Law Government Agencies Online Stalking Independent Consultant Gerald Bluhm IBE (Identity-Based Encryption) David J. Loundy Michael R. Anderson Law Enforcement and Computer Tyco Fire & Security Craig Gentry DePaul University New Technologies, Inc. Security Threats and Measures DoCoMo USA Labs Trademark Law and the Internet Forensic Analysis of Unix Systems Electronic Attacks Mathieu Deflem Ray Everett-Church Cryptographic Protocols Thomas M. Chen University of South Carolina Dario V. Forte PrivacyClue LLC Markus Jakobsson University of Milan, Crema, Italy Southern Methodist University J. Eagle Shutt Online Contracts Indiana University, Bloomington Matthew C. Elder University of South Carolina Forensic Analysis Symantec Corporation G.E. Evans Quantum Cryptography of Windows Systems Combating the Cyber Crime Threat: Queen Mary University of London G. Massimo Palma Steve J. Chapin Jimi Thompson Developments in Global Intellectual Property Research Università degli Studi di Milano, Italy Syracuse University Southern Methodist University Law Enforcement Institute, UK Key Lengths Roderic Broadhurst Chester J. Maciag Wireless Information Warfare Electronic Speech Arjen K. Lenstra University of Hong Kong, Hong Kong Air Force Research Laboratory Randall K. Nichols Seth Finkelstein Lucent Technologies and Technische The George Washington University Digital Identity Consulting Programmer Universiteit Eindhoven, USA Operating System Security Drummond Reed William Stallings Computer Network Operations (CNO) Software Piracy Key Management OneName Corporation Independent Consultant Andrew Blyth Robert K. Moniot Xukai Zou University of Glamorgan, UK Jerry Kindall Fordham University Purdue University Unix Security Electronic Protection Epok, Inc. Mark Shacklette Internet Gambling Amandeep Thukral The University of Chicago Neil C. Rowe Digital Divide Susanna Frederick Fischer Purdue University Naval Postgraduate School Jaime J. Davila Linux Security The Catholic University of America Secure Electronic Voting Protocols Information Assurance Hampshire College A. Justin Wilder The Digital Millennium Copyright Act Helger Lipmaa Information Technology Agency Peng Liu Legal, Social and Ethical Seth Finkelstein Cybernetica AS (Estonia), Finland Pennsylvania State University Issues of the Internet OpenVMS Security Consulting Programmer Digital Evidence Meng Yu Kenneth Einar Himma Robert Gezelter Digital Courts, Robin C. Stuart Monmouth University Seattle Pacific University Software Consultant the Law and Evidence Digital Investigations Consultant Jiwu Jing Anonymity and Identity Windows 2000 Security Robert Slade Digital Watermarking Chinese Academy of Sciences, on the Internet E. Eugene Schultz Independent Consultant, Canada and Steganography Beijing, China Jonathan Wallace University of California-Berkeley Lab M. A. Suha Independent Consultant Part 3: Foundations of Information, University of Bradford, UK Software Development Part 2: Social and Legal Issues Computer and Network Security Spam and the Legal Counter Attacks B. Sadoun and Quality Assurance Charles Jaeger Pascal Meunier The Legal Implications of Al-Balqà Applied University, Jordan Southern Oregon University Encryption Basics Purdue University Information Security: Regulatory Ari Juels Mohammad S. Obaidat The Common Criteria Compliance and Liability Cyberlaw: The Major Areas, RSA Laboratories Monmouth University Development and Information John P. McDermott Blaze D. Waleski Law Enforcement Security Aspects Symmetric-Key Encryption Naval Research Laboratory Fulbright & Jaworski L.L.P. and Digital Evidence Dennis M. Powers Jonathan Katz Hackers, Crackers J. Philip Craiger Southern Oregon University University of Maryland and Computer Criminals University of Central Florida David Dittrich Global Aspects of Cyberlaw Data Encryption Standard (DES) Mike Speciner Mark Pollitt University of Washington Julia Alpert Gladstone DigitalEvidencePro Bryant College Independent Consultant Kenneth Einar Himma II Jeff Swauger Seattle Pacific University The Advanced Encryption Standard University of Central Florida Duncan A. Buell University of South Carolina

“This book is a ‘must-have’ for anyone practicing or researching any aspect of computer security.” —Aviel D. Rubin, Professor, Computer Science, Johns Hopkins University; Technical Director, Information Security Institute; President, Independent Security Evaluators LLC

ABOUT THE EDITOR-IN-CHIEF: HOSSEIN BIDGOLI, PHD, is Professor of Management Information Systems at California State University, Bakersfield. Dr. Bidgoli helped set up the first PC lab in the United States. He is the author of 43 textbooks, 28 manuals, and over five dozen technical articles and papers on various aspects of computer applications, e-commerce, and information systems security published and presented throughout the world. Dr. Bidgoli also serves as the editor-in-chief of the Internet Encyclopedia and Encyclopedia of Information Systems. Dr. Bidgoli was selected as the California State University Bakersfield’s 2001-2002 Professor of the Year. VPN Architecture Auditing Information Volume III: Threats, Vulnerabilities, Prevention, Stan Kurkovsky Systems Security Detection and Management Contents Columbus State University S. Rao Vallabhaneni IP-Based VPN SRV Professional Publications David E. McDysan Evidence Collection MCI Corporation and Analysis Tools Part 1: Threats and Vulnerabilities Cracking WEP Medical Records Security Identity Management Christopher L. T. Brown to Information and Computing Pascal Meunier Normand M. Martel Technology Pathways LLC Infrastructures Purdue University Medical Technology Research Corp. John Linn RSA Laboratories Information Leakage: Denial of Service Attacks Access Control: Internal Security Threats Use of Deception Techniques: Detection and Countermeasures E. Eugene Schultz Principles and Solutions Phil Venables Marcus K. Rogers University of California-Berkeley Lab S. De Capitani di Vimercati Honeypots and Decoys Purdue University Fred Cohen Goldman Sachs Network Attacks Università di Milano, Italy Physical Security Threats S. Paraboschi University of New Haven Digital Rights Management Edward Amoroso Renato Iannella Mark Michael AT&T Laboratories Università di Bergamo, Italy Active Response King’s College IPR Systems, Italy Pierangela Samarati to Computer Intrusions Fault Attacks David Dittrich Web Hosting Fixed-Line Telephone System Hamid Choukri Università di Milano, Italy Vulnerabilities University of Washington Doug Kaye Gemplus & University of Bordeaux, Password Authentication Mak Ming Tak IT Conversations France Jeremy L. Rasmussen Kenneth Einar Himma Hong Kong University of Science Sypris Electronics, LLC Seattle Pacific University Managing a Network Environment and Technology, Hong Kong Michael Tunstall Gemplus & Royal Holloway Jian Ren Xu Yan Computer and Network Part 3: Detection, Recovery, Michigan State University University, France Authentication Management and Policy Hong Kong University of Science E-Mail and Internet Use Policies and Technology, Hong Kong Side-Channel Attacks Patrick McDaniel Considerations Pankaj Rohatgi Pennsylvania State University Nancy J. King Zenith Y.W. Law Oregon State University JustSolve Consulting, Hong Kong IBM Corporation Antivirus Technology Intrusion Detection Systems Basics Matthew Schmid Peng Ning Forward Security: Adoptive E-Mail Threats and Vulnerabilities Part 2: Prevention: Keeping the Cigital, Inc. North Carolina State University Cryptography Time Evolution David Harley Hackers and Crackers at Bay Gene Itkis Biometric Basics Sushil Jajodia Open University, UK Boston University Physical Security Measures and Biometric Authentication E-Commerce Vulnerabilities James L. Wayman Host-Based Intrusion Security Policy Guidelines Sviatoslav Braynov Mark Michael Mohamed Hamdi King’s College San Jose State University Detection Systems University of Illinois, Springfield Giovanni Vigna National Digital Certification RFID and Security Issues and Concerns Agency, Tunisia Hacking Techniques in Biometric IT Security University of California, in Wired Networks Stephen A. Weis Santa Barbara Noureddine Boudriga Massachusetts Institute of Technology Philip Statham Qijun Gu UK Government Biometrics Christopher Kruegel National Digital Certification Pennsylvania State University Cryptographic Privacy Working Group, UK Technical University, Agency, Tunisia Peng Liu Protection Techniques Vienna, Austria Mohammad S. Obaidat Markus Jakobsson Firewall Basics Pennsylvania State University Network-Based Intrusion Monmouth University Indiana University, Bloomington James E. Goldman Chao-Hsien Chu Purdue University Detection Systems The Asset-Security Goals Pennsylvania State University Cryptographic Hardware Marco Cremonini Continuum: A Process for Security Firewall Architectures Hacking Techniques Security Modules University of Milan, Italy Margarita Maria Lenk Nicko van Someren James E. Goldman in Wireless Networks Use of Agent Technology Colorado State University nCipher Corporation, UK Purdue University Prabhaker Mateti for Intrusion Detection Multilevel Security Wright State University Smart Card Security Packet Filtering Dipankar Dasgupta Richard E. Smith and Stateful Firewalls Computer Viruses and Worms Michael Tunstall The University of Memphis University of St. Thomas Gemplus & Royal Holloway Avishai Wool Robert Slade Contingency Planning Management Multilevel Security Models University, France Tel Aviv University, Israel Independent Consultant, Canada Marco Cremonini Mark Stamp Sebastien Petit Proxy Firewalls Trojan Horse Programs University of Milan, Italy San Jose State University Gemplus, France John D. McLaren Adam Young Murray State University Pierangela Samarati Ali Hushyar Cigital, Inc. Stephanie Porte University of Milan, Italy San Jose State University Gemplus, France E-Commerce Safeguards Hoax Viruses and Virus Alerts Computer Security Incident Security Architectures Client-Side Security Mark S. Merkow Robert Slade University of Phoenix Response Teams (CSIRTs) Nicole Graf Independent Consultant, Canada Charles Border Raymond R. Panko University of Cooperative Rochester Institute of Technology Digital Signatures and Electronic University of Hawaii, Manoa Education, Germany Hostile Java Applets Signatures Server-Side Security Dominic Kneeshaw David Evans Raymond R. Panko Implementing a Security University of Virginia Slim Rekhis Awareness Program Independent Consultant, Germany National Digital Certification Agency, University of Hawaii, Manoa K. Rudolph Quality of Security Service: Spyware and University of Carthage, Tunisia E-Mail Security Tom S. Chan IIINative Intelligence, Inc. Adaptive Security Jon Callas Noureddine Boudriga Timothy E. Levin Southern New Hampshire University PGP Corporation Risk Assessment National Digital Certification Agency, for Risk Management Naval Postgraduate School Mobile Code and Security and University of Carthage, Tunisia Security for ATM Networks Song Fu Rick Kazman Cynthia E. Irvine Mohammad S. Obaidat Thomas D. Tarman University of Hawaii, Manoa Naval Postgraduate School Wayne State University Monmouth University Sandia National Laboratories Cheng-Zhong Xu Daniel N. Port Evdoxia Spyropoulou VPN Basics Wayne State University Protecting Web Sites University of Hawaii, Manoa Technical Vocational Educational Dawn Alexander G. I. Papadimitriou David Klappholz School of Computer Science Wireless Threats and Attacks University of Maryland Aristotle University, Greece Stevens Institute of Technology of Halandri, Greece Robert J. Boncella Mohammad S. Obaidat April Giles Security Insurance Security Policy Enforcement Washburn University Monmouth University Independent Consultant and Best Practices Cynthia E. Irvine WEP Security Database Security C. Papazoglou Selahattin Kuru Naval Postgraduate School Nikita Borisov Michael Gertz Aristotle University, Greece Isik University, Turkey University of California, Berkeley Guidelines for a Comprehensive University of California, Davis A.S. Pomportsis Onur Ihsan Arsun Security System Bluetooth Security Arnon Rosenthal Aristotle University, Greece Isik University, Turkey Hossein Bidgoli Susanne Wetzel The MITRE Corporation Mustafa Yıldız California State University, Stevens Institute of Technology Isik University, Turkey Bakersfield John & Sons 111 River Street Hoboken, NJ 07030 FPO

The Definitive Resource on Information and Computer Security SPECIAL PRE-PUB OFFER!

See inside for details

PROMO CODE 54001 CODE PROMO TO ORDER BY PHONE: PHONE: BY ORDER TO 1-877-762-2974

111 River Street, Hoboken, NJ 07030 NJ Hoboken, Street, River 111

MAIL TO: TO: MAIL John Wiley & Sons, Inc., Attn: M. Patterson M. Attn: Inc., Sons, & Wiley John

iySaeZp______City/State/Zip

will be shipped via “2-Day Air.” “2-Day via shipped be will

drs ______Address

All orders are subject to credit review. Alaska, Hawaii, Puerto Rico, and other U.S. Protectorates orders Protectorates U.S. other and Rico, Puerto Hawaii, Alaska, review. credit to subject are orders All

opn ae(fapial)______applicable) (if Name Company will normally arrive within 1-2 business days from placement of order via telephone (before 1:00pm EST). 1:00pm (before telephone via order of placement from days business 1-2 within arrive normally will

will normally arrive within 2-3 business days of placement of order via telephone. Orders shipped via “1-Day” via shipped Orders telephone. via order of placement of days business 2-3 within arrive normally will Name / Title______/ Name

Orders shipped via “Surface” will normally arrive within 7-10 business days. Orders shipped via “2-Day” via shipped Orders days. business 7-10 within arrive normally will “Surface” via shipped Orders

SHIP TO (if different from Customer Information): Customer from different (if TO SHIP

DELIVERY

(required on all orders in case of inquiry) of case in orders all on (required

your valid promotion code to receive any applicable discount. applicable any receive to code promotion valid your

eehn:______mi:______Email: Telephone:

by phone, fax, or mail with a copy of your tax-exemption certificate. When ordering, please specify please ordering, When certificate. tax-exemption your of copy a with mail or fax, phone, by

iySaeZp______City/State/Zip Add appropriate sales tax. FED TAX ID 135593032. Tax-Exempt Institutions: All orders must be placed be must orders All Institutions: Tax-Exempt 135593032. ID TAX FED tax. sales appropriate Add

AE TAX SALES (Please note we cannot ship to post office boxes) office post to ship cannot we note (Please

drs ______Address

ahadtoa tm$.0$.0$4.00 $3.00 $3.00 item additional Each FORM ORDER

raiain______Organization is tm$.0$05 $17.50 $10.50 $5.00 Item First

ecads ufc -a 1-Day 2-Day Surface Merchandise Name / Title______/ Name

HPIGCHARGES SHIPPING UTMRINFORMATION CUSTOMER

via 2-Day air. FOB SHIPPING POINTS: Somerset, NJ and Harrisonburg, VA. Harrisonburg, and NJ Somerset, POINTS: SHIPPING FOB air. 2-Day via OA NLSD______ENCLOSED TOTAL

is available only within the 50 United States and only via UPS Ground. Free shipping to HI, AK, and PR is PR and AK, HI, to shipping Free Ground. UPS via only and States United 50 the within only available is

(0-471-22201-1, December 2003, $750) 2003, December (0-471-22201-1, AE A ______TAX SALES

discounts. All orders must be paid in U.S. dollars. Prices subject to change. Free shipping, when offered, when shipping, Free change. to subject Prices dollars. U.S. in paid be must orders All discounts. The Internet Encyclopedia Encyclopedia Internet The three-volume three-volume

HPIGCAGS______CHARGES SHIPPING

sets (unless otherwise noted), and Pfeiffer Annuals excluded. Offers cannot be combined for additional for combined be cannot Offers excluded. Annuals Pfeiffer and noted), otherwise (unless sets the best-selling and award-winning award-winning and best-selling the

RE MUT______AMOUNT ORDER Other works by Dr. Bidgoli include include Bidgoli Dr. by works Other Shipping and handling, applicable taxes, sale items, subscriptions, supplements, electronic products and products electronic supplements, subscriptions, items, sale taxes, applicable handling, and Shipping

ucaeOdr#______# Order Purchase

700 ______$750.00 / 00 . 900 $ (0-471-64833-7) Security Information of Handbook ❑

THREE VOLUME SET VOLUME THREE order. Billed orders will include shipping charges. Billed orders in U.S. currency only. currency U.S. in orders Billed charges. shipping include will orders Billed order.

ber are required. For orders over $500.00, a hard copy of the purchase order must accompany your accompany must order purchase the of copy hard a $500.00, over orders For required. are ber 200 ______$250.00 / 00 . 00 3 $ (0-471-64832-9) Management and Detection

Bill My Company My Bill (for organizations only). only). organizations (for A valid purchase order number and telephone num- telephone and number order purchase valid A Volume 3: Threats, Vulnerabilities, Prevention, Prevention, Vulnerabilities, Threats, 3: Volume ❑ ❑

200 ______$250.00 / 00 . 00 3 $ (0-471-64831-0) Foundations Security

uhrzdSgaue______Signature Authorized

Legal, and International Issues and and Issues International and Legal,

Volume 2: Information Warfare, Social, Social, Warfare, Information 2: Volume

❑ adodrNm ______Name Cardholder

200 ______$250.00 / 00 . 00 3 $ (0-471-64830-2) Protocols and Standards

Card # ______Exp. Date ______/______/______Date Exp. ______# Card

Volume 1: Key Concepts, Infrastructure, Infrastructure, Concepts, Key 1: Volume ❑

Payment Enclosed: Enclosed: Payment DISCOVER DISCOVER AMEX MC VISA CHECK/MONEY ORDER CHECK/MONEY INDIVIDUAL VOLUMES INDIVIDUAL ❑ ❑ ❑ ❑ ❑

SPECIAL PRE-PUBLICATION OFFER — SAVE WHEN YOU ORDER BY JANUARY 31, 2006 31, JANUARY BY ORDER YOU WHEN SAVE — OFFER PRE-PUBLICATION SPECIAL PAYMENT METHOD (all payments must be in US Dollars): US in be must payments (all METHOD PAYMENT