Table of Contents, Volume II
Information Warfare, Social, Legal, and International Issues and Security Foundations
Contents
Part 1: Information Warfare
71. | Cybercrime and the U.S. Criminal Justice System |
72. | Cyberterrorism and Information Security |
73. | Online Stalking |
74. | Electronic Attacks |
75. | Wireless Information Warfare |
76. | Computer Network Operations (CNO) |
77. | Electronic Protection |
78. | Information Assurance |
Part 2: Social, and Legal Issues
79. | The Legal Implications of Information Security: Regulatory Compliance and Liability |
80. | Hackers, Crackers and Computer Criminals |
81. | Hacktivism |
82. | Corporate Spying: The Legal Aspects |
83. | Law Enforcement and Computer Security Threats and Measures |
84. | Combating the Cyber Crime Threat: Developments in Global Law Enforcement |
85. | Digital Identity |
86. | Digital Divide |
87. | Legal, Social and Ethical Issues of the Internet |
88. | Anonymity and Identity on the Internet |
89. | Spam and the Legal Counter Attacks |
90. | Cyberlaw: The Major Areas, Development, and Information Security Aspects |
91. | Global Aspects of Cyberlaw |
92. | Privacy Law and the Internet |
93. | Internet Censorship |
94. | Copyright Law |
95. | Patent Law |
96. | Trademark Law and the Internet |
97. | Online Contracts |
98. | Electronic Speech |
99. | Software Piracy |
100. | Internet Gambling |
101. | The Digital Millennium Copyright Act |
102. | Digital Courts, the Law and Evidence |
Part 3: Foundations of Information, Computer and Network Security
103. | Encryption Basics |
104. | Symmetric-Key Encryption |
105. | Data Encryption Standard (DES) |
106. | The Advanced Encryption Standard |
107. | Hashes and Message Digests |
108. | Number Theory for Information Security |
109. | Public-Key Algorithms |
110. | Elliptic Curve Cryptography |
111. | IBE (Identity-Based Encryption) |
112. | Cryptographic Protocols |
113. | Quantum Cryptography |
114. | Key Lengths |
115. | Key Management |
116. | Secure Electronic Voting Protocols |
117. | Digital Evidence |
118. | Digital Watermarking and Steganography |
119. | Law Enforcement and Digital Evidence |
120. | Forensic Computing |
121. | Computer Forensic Procedures and Methods |
122. | Computer Forensics: Computer Media Reviews in Classified Government Agencies |
123. | Forensic Analysis of Unix Systems |
124. | Forensic Analysis of Windows Systems |
125. | Operating System Security |
126. | Unix Security |
127. | Linux Security |
128. | OpenVMS Security |
129. | Windows 2000 Security |
130. | Software Development and Quality Assurance |
131. | The Common Criteria |