Wiley.com

Table of Contents, Volume I

The Handbook of Information Security, Volume I
Key Concepts, Infrastructure, Standards and Protocols
Contents


Part 1: Key Concepts and Applications related to Information Security
1. Internet Basics
2. Digital Economy
3. Online Retail Banking: Security Concerns, Breaches, and Controls
4. Digital Libraries: Security and Preservation Considerations
5. E-Mail and Instant Messaging
6. Internet Relay Chat
7. Online Communities
8. Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
9. Search Engines: Security, Privacy and Ethical Issues
10. Web Services
11. Electronic Commerce
12. EDI Security
13. Electronic Payment Systems
14. Intranets: Principals, Privacy and Security Considerations
15. Extranets: Applications, Development, Security and Privacy
16. Business-to-Business Electronic Commerce
17. Click-and-Brick Electronic Commerce
18. Mobile Commerce
19. E-education and Information Privacy and Security
20. Security in E-Learning
21. E-Government
22. E-government Security Issues and Measures
23. International Security Issues of E-Government


Part 2: Infrastructure for the Internet, Computer Networks and Secure Information Transfer
24. Conducted Communications Media
25. Routers and Switches
26.Radio Frequency and Wireless Communications Security
27. Wireless Channels
28. Security in Circuit, Message, and Packet Switching
29. Digital Communication
30. Local Area Networks
31. Wide Area and Metropolitan Area Networks
32.Home Area Networking
33. Public Network Technologies and Security
34. Client/Server Computing: Principles and Security Considerations
35. Peer-to-Peer Security
36. Security Middleware
37. Internet Architecture
38. TCP/IP Suite
39. Voice over Internet Protocol (VoIP)
40. Security and Web Quality of Service
41. Mobile Devices and Protocols
42. Bluetooth Technology
43. Wireless Local Area Networks
44. Security in Wireless Sensor Networks
45. Cellular Networks
46. Mobile IP
47. IP Multicast and its Security
48. TCP over Wireless Links
49. Air–Interface Requirements for Mobile Data Services
50. Wireless Internet: A Cellular Perspective
51. Security for Satellite Networks
52. Security of Broadband Access Networks
53. Ad hoc Network Security


Part 3: Standards and Protocols for Secure Information Transfer
54. Standards for Product Security Assessment
55. Digital Certificates
56. Internet E-Mail Architecture
57. PKI (Public Key Infrastructure)
58. S/MIME (Secure MIME)
59. PGP (Pretty Good Privacy)
60. SMTP (Simple Mail Transfer Protocol)
61. Internet Security Standards
62. Kerberos
63. IPsec: AH (Authentication Header) and ESP (Encapsulating Security Payload)
64. IPsec: IKE (Internet Key Exchange)
65. Secure Sockets Layer (SSL)
66. PKCS (Public-Key Cryptography Standards)
67. Secure Shell (SSH)
68. Security and the Wireless Application Protocol (WAP)
69. Wireless Network Standards and Protocol (802.11)
70. P3P (Platform for Privacy Preferences Project)