Overview
- Editors:
-
-
Peter Stavroulakis
-
Technical University of Crete, Chania, Greece
-
Mark Stamp
-
Dept. Computer Science, San Jose State University, San Jose, USA
Comprehensive handbook on all practically relevant I C security topics
Covers computers, computer networks, and telecommunications
Contains an extensive applications part
Mostly technical, but deals also with legal and political aspects
Includes supplementary material: sn.pub/extras
Access this book
Other ways to access
Table of contents (38 chapters)
-
Networking
-
Front Matter
Pages 333-333
-
- Ping Wang, Baber Aslam, Cliff C. Zou
Pages 335-350
-
- Theo Dimitrakos, David Brossard, Pierre de Leusse, Srijith K. Nair
Pages 351-382
-
- Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, Mohammed Atiquzzaman
Pages 383-405
-
-
- Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris
Pages 421-432
-
-
Optical Networking
-
Front Matter
Pages 449-449
-
-
- Apostolos Argyris, Dimitris Syvridis
Pages 479-510
-
Wireless Networking
-
Front Matter
Pages 511-511
-
- Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones
Pages 513-552
-
- Jamil Ibriq, Imad Mahgoub, Mohammad Ilyas
Pages 553-578
-
-
- Konstantinos Birkos, Theofilos Chrysikos, Stavros Kotsopoulos, Ioannis A. Maniatis
Pages 603-630
-
Software
-
Front Matter
Pages 631-631
-
- Úlfar Erlingsson, Yves Younan, Frank Piessens
Pages 633-658
-
- Teodoro Cipresso, Mark Stamp
Pages 659-696
-
- Antonio Lioy, Gianluca Ramunno
Pages 697-717
-
About this book
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.
Reviews
Aus den Rezensionen:
“... Besonderes Augenmerk gilt dabei dem Wechselspiel zwischen Kommunikation und dem Bereich der Informationssicherheit. ... herausgegriffene Themen illustrieren die Relevanz des Buchs. … Verschiedene HIPs werden vorgestellt und verglichen Weitere Beitrage befassen sich mit Phishing Attacken bzw mit Authentifikationen mittels biometrischer Methoden. ... Die Beitrage sind theoretisch fundiert und oft praxisbezogen. … Das Buch eignet sich deshalb gut als Einstiegslektüre für Studierende oder für Informatiker, die sich nur am Rande für die Sicherheitsthematik interessieren. Für Experten ist das Buch eine wertvolle, vielseitige Inspirationsquelle.“ (in: Bulletin electrosuisse, 2/July/2010, Issue 7, S. 121)
Editors and Affiliations
-
Technical University of Crete, Chania, Greece
Peter Stavroulakis
-
Dept. Computer Science, San Jose State University, San Jose, USA
Mark Stamp