Wiley.com

Contributors, Volume II

The Handbook of Information Security, Volume II
Information Warfare, Social, Legal, and International Issues and Security Foundations
Contents

Part 1: Information Warfare

71. Cybercrime and the U.S. Criminal Justice System


Susan W. Brenner
University of Dayton

72. Cyberterrorism and Information Security

Charles Jaeger
Southern Oregon University

73. Online Stalking

David J. Loundy
DePaul University

74. Electronic Attacks

Thomas M. Chen
Southern Methodist University

Matthew C. Elder
Symantec Corporation

Jimi Thompson
Southern Methodist University

75. Wireless Information Warfare

Randall K. Nichols
The George Washington University

76. Computer Network Operations (CNO)

Andrew Blyth
University of Glamorgan, UK

77. Electronic Protection

Neil C. Rowe
Naval Postgraduate School

78. Information Assurance

Peng Liu
Pennsylvania State University

Meng Yu
Monmouth University

Jiwu Jing
Chinese Academy of Sciences, Beijing,China

Part 2: Social, and Legal Issues

79. The Legal Implications Of Information Security:
Regulatory Compliance and Liability


Blaze D. Waleski
Fulbright & Jaworski L.L.P.

80. Hackers, Crackers and Computer Criminals

David Dittrich
University of Washington

Kenneth Einar Himma
Seattle Pacific University

81. Hacktivism

Paul A. Taylor
University of Leeds, UK

Jan Ll. Harris
Salford University, UK

82. Corporate Spying: The Legal Aspects

William A. Zucker
Gadsby Hannah LLP

Scott Nathan
Independent Consultant

83. Law Enforcement and Computer Security Threats and Measures

Mathieu Deflem
University of South Carolina

J. Eagle Shutt
University of South Carolina

84. Combating the Cyber Crime Threat: Developments in Global Law Enforcement

Roderic Broadhurst
University of Hong Kong, Hong Kong

85. Digital Identity

Drummond Reed
OneName Corporation

Jerry Kindall
Epok, Inc.

86. Digital Divide

Jaime J. Davila
Hampshire College

87. Legal, Social and Ethical Issues of the Internet

Kenneth Einar Himma
Seattle Pacific University

88. Anonymity and Identity on the Internet

Jonathan Wallace
Independent Consultant

89. Spam and the Legal Counter Attacks

Charles Jaeger
Southern Oregon University

90. Cyberlaw: The Major Areas, Development, and Information Security Aspects

Dennis M. Powers
Southern Oregon University

91. Global Aspects of Cyberlaw

Julia Alpert Gladstone
Bryant College

92. Privacy Law and the Internet

Ray Everett-Church
PrivacyClue LLC

93. Internet Censorship

Richard A. Spinello
Boston College

94. Copyright Law

Randy Canis
Greensfelder, Hemker & Gale, P.C.

95. Patent Law

Gerald Bluhm
Tyco Fire & Security

96. Trademark Law and the Internet

Ray Everett-Church
PrivacyClue LLC

97. Online Contracts

G.E. Evans
Queen Mary University of London Intellectual Property Research Institute, UK

98. Electronic Speech

Seth Finkelstein
Consulting Programmer

99. Software Piracy

Robert K. Moniot
Fordham University

100. Internet Gambling

Susanna Frederick Fischer
The Catholic University of America

101. The Digital Millennium Copyright Act

Seth Finkelstein
Consulting Programmer

102. Digital Courts, the Law and Evidence

Robert Slade
Independent Consultant, Canada

Part 3: Foundations of Information, Computer and Network Security

103. Encryption Basics

Ari Juels
RSA Laboratories

104. Symmetric-Key Encryption

Jonathan Katz
University of Maryland

105. Data Encryption Standard (DES)

Mike Speciner
Independent Consultant

106. The Advanced Encryption Standard

Duncan A. Buell
University of South Carolina

107. Hashes and Message Digests

Magnus Daum
Ruhr University Bochum, Germany

Hans Dobbertin
Ruhr University Bochum, Germany

108. Number Theory for Information Security

Duncan A. Buell
University of South Carolina

109. Public-Key Algorithms

Bradley S. Rubin
University of St. Thomas

110. Elliptic Curve Cryptography

Nigel Smart
University of Bristol, UK

111. IBE (Identity-Based Encryption)

Craig Gentry
DoCoMo USA Labs

112. Cryptographic Protocols

Markus Jakobsson
Indiana University, Bloomington

113. Quantum Cryptography

G.Massimo Palma
Universita' degli Studi di Milano, Italy

114. Key Lengths

Arjen K. Lenstra
Lucent Technologies and Technische Universiteit Eindhoven, USA

115. Key Management

Xukai Zou
Purdue University

Amandeep Thukral
Purdue University

116. Secure Electronic Voting Protocols

Helger Lipmaa
Cybernetica AS and University of Tartu, Estonia

117. Digital Evidence

Robin C. Stuart
Digital Investigations Consultant

118. Digital Watermarking and Steganography

M. A. Suhail
University of Bradford, UK

B. Sadoun
Al-Balqa’ Applied University, Jordan

Mohammad S. Obaidat
Monmouth University

119. Law Enforcement and Digital Evidence

J. Philip Craiger
University of Central Florida

Mark Pollitt
DigitalEvidencePro

Jeff Swauger
University of Central Florida

120. Forensic Computing

Mohamed Hamdi
National Digital Certification Agency, Tunisia

Noureddine Boudriga
National Digital Certification Agency, Tunisia

Mohammad S. Obaidat
Monmouth University

121. Computer Forensic Procedures and Methods

J. Philip Craiger
University of Central Florida

122. Computer Forensics: Computer Media Reviews in Classified Government Agencies

Michael R. Anderson
SCERC

123. Forensic Analysis of Unix Systems

Dario V. Forte
University of Milan, Crema, Italy

124. Forensic Analysis of Windows Systems

Steve J. Chapin
Syracuse University

Chester J. Maciag
Air Force Research Laboratory

125. Operating System Security

William Stallings
Independent Consultant

126. Unix Security

Mark Shacklette
The University of Chicago

127. Linux Security

A. Justin Wilder
Information Technology Agency

128. OpenVMS Security

Robert Gezelter
Software Consultant

129. Windows 2000 Security

E. Eugene Schultz
University of California-Berkeley Lab

130. Software Development and Quality Assurance

Pascal Meunier
Purdue University

131. The Common Criteria

John P. McDermott
Naval Research Laboratory