Contents
Guide to the Handbook of Information Security
Volume III: Threats, Vulnerabilities, Prevention, Detection, and Management
Part 1: Threats and Vulnerabilities to Information and Computing Infrastructures
Marcus K. Rogers
Mark Michael
Fixed-Line Telephone System Vulnerabilities
Mak Ming Tak, Xu Yan, and Zenith Y. W. Law
E-Mail Threats and Vulnerabilities
David Harley
Sviatoslav Braynov
Hacking Techniques in Wired Networks
Qijun Gu, Peng Liu, and Chao-Hsien Chu
Hacking Techniques in Wireless Networks
Prabhaker Mateti
Robert Slade
Adam L. Young
Robert Slade
David Evans
Tom S. Chan
Song Fu and Cheng-Zhong Xu
Robert J. Boncella
Nikita Borisov
Susanne Wetzel
Pascal Meunier
E. Eugene Schultz
Edward Amoroso
Hamid Choukri and Michael Tunstall
Pankaj Rohatgi
Part 2: Prevention: Keeping the Hackers and Crackers at Bay
Mark Michael
Stephen A. Weis
Cryptographic Privacy Protection Techniques
Markus Jakobsson
Cryptographic Hardware Security Modules
Nicko van Someren
Michael Tunstall, Sebastien Petit, and Stephanie Porte ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.