Sold Out
Book Categories |
Preface v
Advisory board vii
Introduction K. de Leeuw 1
Intellectual Ownership
Limitations on the publishing of scientific research J. Meadows 29
Industrialists, inventors and the German Patent System, 1877-1957: A comparative perspective K. Gispen 53
Reflecting media: A cultural history of copyright and the media R. Verhoogt C. Schriks 83
The history of copyright protection of computer software: The emancipation of a work of technology toward a work of authorship M. de Cock Buning 121
A history of software patents R. Plotkin 141
Identity-Management
Semiotics of identity management P. Wisse 167
History of document security K.J. Schell 197
From frankpledge to chip and pin: Identification and identity in England, 1475-2005 E. Higgs 243
The scientific development of biometrics over the last 40 years J.L. Wayman 263
Communication Security
The rise of cryptology in the European Renaissance G.F. Strasser 277
Cryptology in the Dutch Republic: A case-study K. de Leeuw 327
Intelligence and the emergence of the information societyin eighteenth-century Britain J. Black 369
Rotor machines and bombes F.L. Bauer 381
Tunny and Colossus: Breaking the Lorenz Schlusselzusatz traffic B. J. Copeland 447
Boris Hagelin and Crypto AG: Pioneers of encryption S. Frik 479
Eavesdroppers of the Kremlin: KGB sigint during the Cold War M. Aid 497
National Security Agency: The historiography of concealment J. Fitsanakis 523
An introduction to modern cryptology B. Preneel 565
Computer Security
A history of computer security standards J.R. Yost 595
Security models D. Gollmann 623
Computer security through correctness and transparency H. Meijer J.-H. Hoepman B. Jacobs E. Poll 637
IT security and IT auditing between 1960 and 2000 M. van Biene-Hershey 655
A history of internet security L. DeNardis 681
History of computer crime S.W. Brenner 705
Privacy- and Export Regulations
The export of cryptography in the 20th and the 21st Centuries W. Diffie S. Landau 725
History of privacy J. Holvast 737
Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the Information Society A. Charlesworth 771
Information Warfare
The Information Revolution and the transformation of warfare D. Kuehl 821
Biographies 833
Author Index 841
Subject Index 861
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionThe History of Information Security: A Comprehensive Handbook
X
This Item is in Your InventoryThe History of Information Security: A Comprehensive Handbook
X
You must be logged in to review the productsX
X
X
Add The History of Information Security: A Comprehensive Handbook, Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o, The History of Information Security: A Comprehensive Handbook to the inventory that you are selling on WonderClubX
X
Add The History of Information Security: A Comprehensive Handbook, Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o, The History of Information Security: A Comprehensive Handbook to your collection on WonderClub |