Contributors, Volume II
Information Warfare, Social, Legal, and International Issues and Security Foundations
Contents
Part 1: Information Warfare
71. Cybercrime and the U.S. Criminal Justice System
Susan W. Brenner
University of Dayton
72. Cyberterrorism and Information Security
Charles Jaeger
Southern Oregon University
73. Online Stalking
David J. Loundy
DePaul University
74. Electronic Attacks
Thomas M. Chen
Southern Methodist University
Matthew C. Elder
Symantec Corporation
Jimi Thompson
Southern Methodist University
75. Wireless Information Warfare
Randall K. Nichols
The George Washington University
76. Computer Network Operations (CNO)
Andrew Blyth
University of Glamorgan, UK
77. Electronic Protection
Neil C. Rowe
Naval Postgraduate School
78. Information Assurance
Peng Liu
Pennsylvania State University
Meng Yu
Monmouth University
Jiwu Jing
Chinese Academy of Sciences, Beijing,China
Part 2: Social, and Legal Issues
79. The Legal Implications Of Information Security:
Regulatory Compliance and Liability
Blaze D. Waleski
Fulbright & Jaworski L.L.P.
80. Hackers, Crackers and Computer Criminals
David Dittrich
University of Washington
Kenneth Einar Himma
Seattle Pacific University
81. Hacktivism
Paul A. Taylor
University of Leeds, UK
Jan Ll. Harris
Salford University, UK
82. Corporate Spying: The Legal Aspects
William A. Zucker
Gadsby Hannah LLP
Scott Nathan
Independent Consultant
83. Law Enforcement and Computer Security Threats and Measures
Mathieu Deflem
University of South Carolina
J. Eagle Shutt
University of South Carolina
84. Combating the Cyber Crime Threat: Developments in Global Law Enforcement
Roderic Broadhurst
University of Hong Kong, Hong Kong
85. Digital Identity
Drummond Reed
OneName Corporation
Jerry Kindall
Epok, Inc.
86. Digital Divide
Jaime J. Davila
Hampshire College
87. Legal, Social and Ethical Issues of the Internet
Kenneth Einar Himma
Seattle Pacific University
88. Anonymity and Identity on the Internet
Jonathan Wallace
Independent Consultant
89. Spam and the Legal Counter Attacks
Charles Jaeger
Southern Oregon University
90. Cyberlaw: The Major Areas, Development, and Information Security Aspects
Dennis M. Powers
Southern Oregon University
91. Global Aspects of Cyberlaw
Julia Alpert Gladstone
Bryant College
92. Privacy Law and the Internet
Ray Everett-Church
PrivacyClue LLC
93. Internet Censorship
Richard A. Spinello
Boston College
94. Copyright Law
Randy Canis
Greensfelder, Hemker & Gale, P.C.
95. Patent Law
Gerald Bluhm
Tyco Fire & Security
96. Trademark Law and the Internet
Ray Everett-Church
PrivacyClue LLC
97. Online Contracts
G.E. Evans
Queen Mary University of London Intellectual Property Research Institute, UK
98. Electronic Speech
Seth Finkelstein
Consulting Programmer
99. Software Piracy
Robert K. Moniot
Fordham University
100. Internet Gambling
Susanna Frederick Fischer
The Catholic University of America
101. The Digital Millennium Copyright Act
Seth Finkelstein
Consulting Programmer
102. Digital Courts, the Law and Evidence
Robert Slade
Independent Consultant, Canada
Part 3: Foundations of Information, Computer and Network Security
103. Encryption Basics
Ari Juels
RSA Laboratories
104. Symmetric-Key Encryption
Jonathan Katz
University of Maryland
105. Data Encryption Standard (DES)
Mike Speciner
Independent Consultant
106. The Advanced Encryption Standard
Duncan A. Buell
University of South Carolina
107. Hashes and Message Digests
Magnus Daum
Ruhr University Bochum, Germany
Hans Dobbertin
Ruhr University Bochum, Germany
108. Number Theory for Information Security
Duncan A. Buell
University of South Carolina
109. Public-Key Algorithms
Bradley S. Rubin
University of St. Thomas
110. Elliptic Curve Cryptography
Nigel Smart
University of Bristol, UK
111. IBE (Identity-Based Encryption)
Craig Gentry
DoCoMo USA Labs
112. Cryptographic Protocols
Markus Jakobsson
Indiana University, Bloomington
113. Quantum Cryptography
G.Massimo Palma
Universita' degli Studi di Milano, Italy
114. Key Lengths
Arjen K. Lenstra
Lucent Technologies and Technische Universiteit Eindhoven, USA
115. Key Management
Xukai Zou
Purdue University
Amandeep Thukral
Purdue University
116. Secure Electronic Voting Protocols
Helger Lipmaa
Cybernetica AS and University of Tartu, Estonia
117. Digital Evidence
Robin C. Stuart
Digital Investigations Consultant
118. Digital Watermarking and Steganography
M. A. Suhail
University of Bradford, UK
B. Sadoun
Al-Balqa’ Applied University, Jordan
Mohammad S. Obaidat
Monmouth University
119. Law Enforcement and Digital Evidence
J. Philip Craiger
University of Central Florida
Mark Pollitt
DigitalEvidencePro
Jeff Swauger
University of Central Florida
120. Forensic Computing
Mohamed Hamdi
National Digital Certification Agency, Tunisia
Noureddine Boudriga
National Digital Certification Agency, Tunisia
Mohammad S. Obaidat
Monmouth University
121. Computer Forensic Procedures and Methods
J. Philip Craiger
University of Central Florida
122. Computer Forensics: Computer Media Reviews in Classified Government Agencies
Michael R. Anderson
SCERC
123. Forensic Analysis of Unix Systems
Dario V. Forte
University of Milan, Crema, Italy
124. Forensic Analysis of Windows Systems
Steve J. Chapin
Syracuse University
Chester J. Maciag
Air Force Research Laboratory
125. Operating System Security
William Stallings
Independent Consultant
126. Unix Security
Mark Shacklette
The University of Chicago
127. Linux Security
A. Justin Wilder
Information Technology Agency
128. OpenVMS Security
Robert Gezelter
Software Consultant
129. Windows 2000 Security
E. Eugene Schultz
University of California-Berkeley Lab
130. Software Development and Quality Assurance
Pascal Meunier
Purdue University
131. The Common Criteria
John P. McDermott
Naval Research Laboratory