Table of Contents, Volume II

The Handbook of Information Security, Volume II
Information Warfare, Social, Legal, and International Issues and Security Foundations

Part 1: Information Warfare
71. Cybercrime and the U.S. Criminal Justice System
72. Cyberterrorism and Information Security
73. Online Stalking
74. Electronic Attacks
75. Wireless Information Warfare
76. Computer Network Operations (CNO)
77. Electronic Protection
78. Information Assurance

Part 2: Social, and Legal Issues
79. The Legal Implications of Information Security: Regulatory Compliance and Liability
80. Hackers, Crackers and Computer Criminals
81. Hacktivism
82. Corporate Spying: The Legal Aspects
83. Law Enforcement and Computer Security Threats and Measures
84. Combating the Cyber Crime Threat: Developments in Global Law Enforcement
85. Digital Identity
86. Digital Divide
87. Legal, Social and Ethical Issues of the Internet
88. Anonymity and Identity on the Internet
89. Spam and the Legal Counter Attacks
90. Cyberlaw: The Major Areas, Development, and Information Security Aspects
91. Global Aspects of Cyberlaw
92. Privacy Law and the Internet
93. Internet Censorship
94. Copyright Law
95. Patent Law
96. Trademark Law and the Internet
97. Online Contracts
98. Electronic Speech
99. Software Piracy
100. Internet Gambling
101. The Digital Millennium Copyright Act
102. Digital Courts, the Law and Evidence

Part 3: Foundations of Information, Computer and Network Security
103. Encryption Basics
104. Symmetric-Key Encryption
105. Data Encryption Standard (DES)
106. The Advanced Encryption Standard
107. Hashes and Message Digests
108. Number Theory for Information Security
109. Public-Key Algorithms
110. Elliptic Curve Cryptography
111. IBE (Identity-Based Encryption)
112. Cryptographic Protocols
113. Quantum Cryptography
114. Key Lengths
115. Key Management
116. Secure Electronic Voting Protocols
117. Digital Evidence
118. Digital Watermarking and Steganography
119. Law Enforcement and Digital Evidence
120. Forensic Computing
121. Computer Forensic Procedures and Methods
122. Computer Forensics: Computer Media Reviews in Classified Government Agencies
123. Forensic Analysis of Unix Systems
124. Forensic Analysis of Windows Systems
125. Operating System Security
126. Unix Security
127. Linux Security
128. OpenVMS Security
129. Windows 2000 Security
130. Software Development and Quality Assurance
131. The Common Criteria