Advertisement

Handbook of Information and Communication Security

  • Peter Stavroulakis
  • Mark Stamp

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Fundamentals and Cryptography

    1. Front Matter
      Pages 1-1
    2. Clark Thomborson
      Pages 3-20
    3. Jonathan Katz
      Pages 21-34
    4. David Jao
      Pages 35-57
    5. Praveen Gauravaram, Lars R. Knudsen
      Pages 59-79
    6. Christopher Swenson
      Pages 81-89
    7. Jerzy Pejaś, Adrian Skrobek
      Pages 91-128
    8. Kai Xi, Jiankun Hu
      Pages 129-157
    9. Christian Monyk
      Pages 159-174
  3. Intrusion Detection and Access Control

    1. Front Matter
      Pages 175-175
    2. Karen Scarfone, Peter Mell
      Pages 177-192
    3. Bazara I. A. Barry, H. Anthony Chan
      Pages 193-205
    4. Inderjeet Pabla, Ibrahim Khalil, Jiankun Hu
      Pages 207-219
    5. Himanshu Singh, Robert Chun
      Pages 221-234
    6. Jiankun Hu
      Pages 235-255
    7. Neerja Bhatnagar
      Pages 257-272
    8. Alessandro Basso, Francesco Bergadano
      Pages 273-291
    9. Maurizio Colombo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
      Pages 293-308
    10. Fahim Sufi, Ibrahim Khalil, Jiankun Hu
      Pages 309-331
  4. Networking

    1. Front Matter
      Pages 333-333
    2. Ping Wang, Baber Aslam, Cliff C. Zou
      Pages 335-350
    3. Theo Dimitrakos, David Brossard, Pierre de Leusse, Srijith K. Nair
      Pages 351-382
    4. Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, Mohammed Atiquzzaman
      Pages 383-405
    5. Melody Moh, Ji Li
      Pages 407-420
    6. Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris
      Pages 421-432
    7. Zulfikar Ramzan
      Pages 433-448
  5. Optical Networking

    1. Front Matter
      Pages 449-449
    2. Apostolos Argyris, Dimitris Syvridis
      Pages 479-510
  6. Wireless Networking

    1. Front Matter
      Pages 511-511
    2. Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones
      Pages 513-552
    3. Jamil Ibriq, Imad Mahgoub, Mohammad Ilyas
      Pages 553-578
    4. Chih-fan Hsin
      Pages 579-602
    5. Konstantinos Birkos, Theofilos Chrysikos, Stavros Kotsopoulos, Ioannis A. Maniatis
      Pages 603-630
  7. Software

    1. Front Matter
      Pages 631-631
    2. Úlfar Erlingsson, Yves Younan, Frank Piessens
      Pages 633-658
    3. Teodoro Cipresso, Mark Stamp
      Pages 659-696
    4. Antonio Lioy, Gianluca Ramunno
      Pages 697-717
    5. Zheng Yan
      Pages 719-746
    6. Eric Filiol
      Pages 747-769
    7. Thomas H. Austin
      Pages 771-785
  8. Forensics and Legal Issues

    1. Front Matter
      Pages 787-787
    2. Frederick B. Cohen
      Pages 789-808
    3. Shiguo Lian, Yan Zhang
      Pages 809-828
    4. Peter Stavroulakis
      Pages 829-850
  9. Back Matter
    Pages 851-867

About this book

Introduction

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.

Keywords

Access Quality of Service Quality of Service (QoS) Routing communication database firewall information intrusion detection monitoring relational database security wireless sensor networks

Editors and affiliations

  • Peter Stavroulakis
    • 1
  • Mark Stamp
    • 2
  1. 1.Technical University of CreteChaniaGreece
  2. 2.Dept. Computer ScienceSan Jose State UniversitySan JoseUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04117-4
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Engineering
  • Print ISBN 978-3-642-04116-7
  • Online ISBN 978-3-642-04117-4
  • Buy this book on publisher's site