Global Perspectives In Information Security: Legal, Social, And International Issues信息安全的全球展望:法律、社会及国际问题
分類: 图书,进口原版书,人文社科 Non Fiction ,
作者: Hossein Bidgoli 著
出 版 社:
出版时间: 2008-9-1字数:版次: 1页数: 878印刷时间: 2008/09/01开本: 16开印次: 1纸张: 胶版纸I S B N : 9780470372111包装: 精装编辑推荐
作者简介:Hossein Bidgoli, PhD, is professor of management information systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States and served as its first director. He is the author of 43 textbooks, 27 manuals, and more than five dozen technical articles and papers on various aspects of computer applications, information systems and network security, e-commerce, and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor-in-chief of The Internet Encyclopedia, The Handbook of Information Security, The Handbook of Computer Networks, and the Encyclopedia of Information Systems.
The Encyclopedia of Information Systems was the recipient of one of Library Journal's Best Reference Sources for 2002, and The Internet Encyclopedia was the recipient of one of the PSP Awards (Professional and Scholarly Publishing), 2004, awarded by the Association of American Publishers. Dr. Bidgoli was selected as the 2001–2002 Professor of the Year at California State University, Bakersfield.
内容简介
Global Perspectives in Information Security, compiled by renowned expert and professor Hossein Bidgoli, offers an expansive view of current issues in information security. Written by leading academics and practitioners from around the world, this thorough resource explores and examines a wide range of issues and perspectives in this rapidly expanding field. Perfect for students, researchers, and practitioners alike, Professor Bidgoli's book offers definitive coverage of established and cutting-edge theory and application in information security.
目录
Preface
Part One: Legal Issues and Considerations
Chapter 1: Cyberlaw: The Major Areas, Development, and Information Security Aspects (Dennis M Powers, Southern Oregon University)
Chapter 2: Legal, Social, and Ethical Issues of the Internet (Kenneth Einar Himma, Seattle Pacific University)
Chapter 3: Cybercrime and the US Criminal Justice System (Susan W Brenner, University of Dayton School of Law)
Chapter 4: Cyberterrorism and Information Security (Charles Jaeger, Southern Oregon University)
Chapter 5: Law Enforcement and Computer Security Threats and Measures (Mathieu Deflem and J Eagle Shutt, University of South Carolina)
Chapter 6: Corporate Spying: The Legal Aspects (William A Zucker, Gadsby Hannah LLP and Scott Nathan, Independent Consultant)
Chapter 7: Spam and the Legal Counterattacks (Charles Jaeger, Southern Oregon University)
Chapter 8: Hacktivism (Paul A Taylor, University of Leeds, United Kingdom and Jan Ll Harris, University of Salford, United Kingdom)
Chapter 9: Online Contracts (GE Evans, Queen Mary Intellectual Property Research Institute, United Kingdom)
Chapter 10: Law Enforcement and Digital Evidence (J Philip Craiger and Jeff Swauger, University of Central Florida and Mark Pollitt, DigitalEvidencePro)
Part Two: Social Issues and Considerations
Chapter 11: Privacy Law and the Internet (Ray Everett-Church, PrivacyClue LLC)
Chapter 12: Internet Censorship (Richard A Spinello, Boston College)
Chapter 13: Anonymity and Identity on the Internet (Jonathan Wallace, DeCoMo USA Labs)
Chapter 14: Digital Identity (Drummond Reed, OneName Corporation and Jerry Kindall, Epok, Inc)
Chapter 15: Digital Divide (Jaime J Davila, Hampshire College)
Chapter 16: Medical Records Security (Normand M Mariel, Medical Technology Research Corp)
Part Three: International Issues and Policy Considerations
Chapter 17: E-Government Security Issues and Measures (William C Barker, National Institute of Standards and Technology)
Chapter 18: International Security Issues of E-Government (Karin Geiselhart, University of Canberra, Australia)
Chapter 19: Global Aspects of Cyberlaw (Julia Alpert Gladstone, Bryant University)
Chapter 20: Combating the Cybercrime Threat: Developments in Global Law Enforcement (Roderic Broadhurst, Queensland University of Technology, Australia)
Chapter 21: Information Leakage: Detection and Countermeasures (Phil Venables, Goldman Sachs)
Chapter 22: Wireless Information Warfare (Randall K Nichols, The George Washington University & University of Maryland University College)
Chapter 23: E-Mail and Internet Use Policies (Nancy J King, Oregon State University)
Chapter 24: Guidelines for a Comprehensive Security System (Hossein Bidgoli, California State University, Bakersfield)
Index