Contents

Contributors

Preface

Guide to the Handbook of Information Security

Reviewers List

Volume Index

Volume III: Threats, Vulnerabilities, Prevention, Detection, and Management

Part 1: Threats and Vulnerabilities to Information and Computing Infrastructures

Internal Security Threats

Marcus K. Rogers

Physical Security Threats

Mark Michael

Fixed-Line Telephone System Vulnerabilities

Mak Ming Tak, Xu Yan, and Zenith Y. W. Law

E-Mail Threats and Vulnerabilities

David Harley

E-Commerce Vulnerabilities

Sviatoslav Braynov

Hacking Techniques in Wired Networks

Qijun Gu, Peng Liu, and Chao-Hsien Chu

Hacking Techniques in Wireless Networks

Prabhaker Mateti

Computer Viruses and Worms

Robert Slade

Trojan Horse Programs

Adam L. Young

Hoax Viruses and Virus Alerts

Robert Slade

Hostile Java Applets

David Evans

Spyware

Tom S. Chan

Mobile Code and Security

Song Fu and Cheng-Zhong Xu

Wireless Threats and Attacks

Robert J. Boncella

WEP Security

Nikita Borisov

Bluetooth Security

Susanne Wetzel

Cracking WEP

Pascal Meunier

Denial of Service Attacks

E. Eugene Schultz

Network Attacks

Edward Amoroso

Fault Attacks

Hamid Choukri and Michael Tunstall

Side-Channel Attacks

Pankaj Rohatgi

Part 2: Prevention: Keeping the Hackers and Crackers at Bay

Physical Security Measures

Mark Michael

RFID and Security

Stephen A. Weis

Cryptographic Privacy Protection Techniques

Markus Jakobsson

Cryptographic Hardware Security Modules

Nicko van Someren

Smart Card Security

Michael Tunstall, Sebastien Petit, and Stephanie Porte ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.