Wonder Club world wonders pyramid logo
×

The History of Information Security: A Comprehensive Handbook Book

The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook, Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o, The History of Information Security: A Comprehensive Handbook has a rating of 4 stars
   2 Ratings
X
The History of Information Security: A Comprehensive Handbook, Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o, The History of Information Security: A Comprehensive Handbook
4 out of 5 stars based on 2 reviews
5
50 %
4
0 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $212.67
Original Magazine
Physical Format

Sold Out

  • The History of Information Security: A Comprehensive Handbook
  • Written by author Karl Maria Michael de Leeuw
  • Published by Elsevier Science, October 2007
  • Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o
  • Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o
Buy Digital  USD$212.67

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface     v
Advisory board     vii
Introduction   K. de Leeuw     1
Intellectual Ownership
Limitations on the publishing of scientific research   J. Meadows     29
Industrialists, inventors and the German Patent System, 1877-1957: A comparative perspective   K. Gispen     53
Reflecting media: A cultural history of copyright and the media   R. Verhoogt   C. Schriks     83
The history of copyright protection of computer software: The emancipation of a work of technology toward a work of authorship   M. de Cock Buning     121
A history of software patents   R. Plotkin     141
Identity-Management
Semiotics of identity management   P. Wisse     167
History of document security   K.J. Schell     197
From frankpledge to chip and pin: Identification and identity in England, 1475-2005   E. Higgs     243
The scientific development of biometrics over the last 40 years   J.L. Wayman     263
Communication Security
The rise of cryptology in the European Renaissance   G.F. Strasser     277
Cryptology in the Dutch Republic: A case-study   K. de Leeuw     327
Intelligence and the emergence of the information societyin eighteenth-century Britain   J. Black     369
Rotor machines and bombes   F.L. Bauer     381
Tunny and Colossus: Breaking the Lorenz Schlusselzusatz traffic   B. J. Copeland     447
Boris Hagelin and Crypto AG: Pioneers of encryption   S. Frik     479
Eavesdroppers of the Kremlin: KGB sigint during the Cold War   M. Aid     497
National Security Agency: The historiography of concealment   J. Fitsanakis     523
An introduction to modern cryptology   B. Preneel     565
Computer Security
A history of computer security standards   J.R. Yost     595
Security models   D. Gollmann     623
Computer security through correctness and transparency   H. Meijer   J.-H. Hoepman   B. Jacobs   E. Poll     637
IT security and IT auditing between 1960 and 2000   M. van Biene-Hershey     655
A history of internet security   L. DeNardis     681
History of computer crime   S.W. Brenner     705
Privacy- and Export Regulations
The export of cryptography in the 20th and the 21st Centuries   W. Diffie   S. Landau     725
History of privacy   J. Holvast     737
Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the Information Society   A. Charlesworth     771
Information Warfare
The Information Revolution and the transformation of warfare   D. Kuehl     821
Biographies     833
Author Index     841
Subject Index     861


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

The History of Information Security: A Comprehensive Handbook, Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o, The History of Information Security: A Comprehensive Handbook

X
WonderClub Home

This item is in your Collection

The History of Information Security: A Comprehensive Handbook, Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o, The History of Information Security: A Comprehensive Handbook

The History of Information Security: A Comprehensive Handbook

X
WonderClub Home

This Item is in Your Inventory

The History of Information Security: A Comprehensive Handbook, Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o, The History of Information Security: A Comprehensive Handbook

The History of Information Security: A Comprehensive Handbook

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: