Contributors

Tarek F. Abdelzhaer

University of Virginia

Security and Web Quality of Service

Dawn Alexander

University of Maryland

Protecting Web Sites

Edward Amoroso

AT&T Laboratories

Network Attacks

Michael R. Anderson

SCERC

Computer Forensics—Computer Media Reviews in Classified Government Agencies

Nadeem Ansari

Wayne State University

Home Area Networking

Amy W. Apon

University of Arkansas

Public Network Technologies and Security

Onur Ihsan Arsun

Isik University, Turkey

Security Insurance and Best Practices

Vijay Atluri

Rutgers University

Mobile Commerce

Pierre Balthazard

Arizona State University

Groupware: Risks, Threats, and Vulnerabilities in the Internet Age

William Bard

The University of Texas, Austin

Digital Communication

William C. Barker

National Institute of Standards and Technology

E-Government Security Issues and Measures

Kent Belasco

First Midwest Bank

Online Retail Banking: Security Concerns, Breaches, and Controls

István Zsolt Berta

Budapest University of Technology and Economics, Hungary

Standards for Product Security Assessment

Bhagyavati

Columbus State University

E-Mail and Instant Messaging

Hossein Bidgoli

California State University, Bakersfield

Guidelines for a Comprehensive Security System Internet Basics

Gerald Bluhm

Tyco Fire & Security

Patent Law

Andrew Blyth

University of Glamorgan, Pontypridd, UK

Computer Network Operations (CNO)

Robert J. Boncella

Washburn University

Secure Sockets Layer (SSL)

Wireless Threats and Attacks

Charles Border

Rochester Institute ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.