Table of Contents, Volume I
Key Concepts, Infrastructure, Standards and Protocols
Contents
Part 1: Key Concepts and Applications related to Information Security
1. | Internet Basics |
2. | Digital Economy |
3. | Online Retail Banking: Security Concerns, Breaches, and Controls |
4. | Digital Libraries: Security and Preservation Considerations | 5. | E-Mail and Instant Messaging |
6. | Internet Relay Chat |
7. | Online Communities |
8. | Groupware: Risks, Threats, and Vulnerabilities in the Internet Age |
9. | Search Engines: Security, Privacy and Ethical Issues |
10. | Web Services |
11. | Electronic Commerce |
12. | EDI Security |
13. | Electronic Payment Systems |
14. | Intranets: Principals, Privacy and Security Considerations |
15. | Extranets: Applications, Development, Security and Privacy |
16. | Business-to-Business Electronic Commerce |
17. | Click-and-Brick Electronic Commerce |
18. | Mobile Commerce |
19. | E-education and Information Privacy and Security |
20. | Security in E-Learning |
21. | E-Government |
22. | E-government Security Issues and Measures |
23. | International Security Issues of E-Government |
Part 2: Infrastructure for the Internet, Computer Networks and Secure Information Transfer
24. | Conducted Communications Media |
25. | Routers and Switches |
26. | Radio Frequency and Wireless Communications Security |
27. | Wireless Channels |
28. | Security in Circuit, Message, and Packet Switching |
29. | Digital Communication |
30. | Local Area Networks |
31. | Wide Area and Metropolitan Area Networks |
32. | Home Area Networking |
33. | Public Network Technologies and Security |
34. | Client/Server Computing: Principles and Security Considerations |
35. | Peer-to-Peer Security |
36. | Security Middleware |
37. | Internet Architecture |
38. | TCP/IP Suite |
39. | Voice over Internet Protocol (VoIP) |
40. | Security and Web Quality of Service |
41. | Mobile Devices and Protocols |
42. | Bluetooth Technology |
43. | Wireless Local Area Networks |
44. | Security in Wireless Sensor Networks |
45. | Cellular Networks |
46. | Mobile IP |
47. | IP Multicast and its Security |
48. | TCP over Wireless Links |
49. | Air–Interface Requirements for Mobile Data Services |
50. | Wireless Internet: A Cellular Perspective |
51. | Security for Satellite Networks |
52. | Security of Broadband Access Networks |
53. | Ad hoc Network Security |
Part 3: Standards and Protocols for Secure Information Transfer
54. | Standards for Product Security Assessment |
55. | Digital Certificates |
56. | Internet E-Mail Architecture |
57. | PKI (Public Key Infrastructure) |
58. | S/MIME (Secure MIME) |
59. | PGP (Pretty Good Privacy) |
60. | SMTP (Simple Mail Transfer Protocol) |
61. | Internet Security Standards |
62. | Kerberos |
63. | IPsec: AH (Authentication Header) and ESP (Encapsulating Security Payload) |
64. | IPsec: IKE (Internet Key Exchange) |
65. | Secure Sockets Layer (SSL) |
66. | PKCS (Public-Key Cryptography Standards) |
67. | Secure Shell (SSH) |
68. | Security and the Wireless Application Protocol (WAP) |
69. | Wireless Network Standards and Protocol (802.11) |
70. | P3P (Platform for Privacy Preferences Project) |