Unavailable
Unavailable
Unavailable
Ebook901 pages32 hours
The History of Information Security: A Comprehensive Handbook
By Jan Bergstra
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security- Written by top experts in law, history, computer and information science- First comprehensive work in Information Security
- Interdisciplinary coverage of the history Information Security- Written by top experts in law, history, computer and information science- First comprehensive work in Information Security
Unavailable
Related to The History of Information Security
Related ebooks
Intelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsDictionary of Information Security Rating: 1 out of 5 stars1/5Cyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsNetwork Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Operations Handbook Rating: 5 out of 5 stars5/5Security Assessment: Case Studies for Implementing the NSA IAM Rating: 3 out of 5 stars3/5ISO IEC 27002 A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPhysical and Logical Security Convergence: Powered By Enterprise Security Management Rating: 0 out of 5 stars0 ratingsCyber Security Threat Intelligence A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsManaging Cisco Network Security 2E Rating: 0 out of 5 stars0 ratingsIT GRC A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Security A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsIT GRC A Complete Guide Rating: 0 out of 5 stars0 ratingsQualified Security Assessor Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsIntrusion Detection Systems A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsInformation Assurance: Dependability and Security in Networked Systems Rating: 5 out of 5 stars5/5Network Security Operations Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIncident Response Team A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecurity Operations A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCisco Security Professional's Guide to Secure Intrusion Detection Systems Rating: 0 out of 5 stars0 ratingsCCNA Voice Study Guide: Exam 640-460 Rating: 0 out of 5 stars0 ratingsComputer Incident Response and Forensics Team Management: Conducting a Successful Incident Response Rating: 4 out of 5 stars4/5Security Sage's Guide to Hardening the Network Infrastructure Rating: 0 out of 5 stars0 ratingsVulnerability Assessment A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity 2021 Rating: 0 out of 5 stars0 ratingsCybersecurity Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBuilding Cisco Remote Access Networks Rating: 5 out of 5 stars5/5Security Incident Response A Complete Guide Rating: 4 out of 5 stars4/5
Business For You
Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5Leadership and Self-Deception: Getting out of the Box Rating: 4 out of 5 stars4/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Just Listen: Discover the Secret to Getting Through to Absolutely Anyone Rating: 4 out of 5 stars4/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Lying Rating: 4 out of 5 stars4/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5Red Notice: A True Story of High Finance, Murder, and One Man's Fight for Justice Rating: 4 out of 5 stars4/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5The Book of Beautiful Questions: The Powerful Questions That Will Help You Decide, Create, Connect, and Lead Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5The Everything Guide To Being A Paralegal: Winning Secrets to a Successful Career! Rating: 5 out of 5 stars5/5Capitalism and Freedom Rating: 4 out of 5 stars4/5Ultralearning: Master Hard Skills, Outsmart the Competition, and Accelerate Your Career Rating: 4 out of 5 stars4/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Robert's Rules of Order: The Original Manual for Assembly Rules, Business Etiquette, and Conduct Rating: 4 out of 5 stars4/5How to Get Ideas Rating: 5 out of 5 stars5/5The Catalyst: How to Change Anyone's Mind Rating: 4 out of 5 stars4/5High Conflict: Why We Get Trapped and How We Get Out Rating: 4 out of 5 stars4/5
Reviews for The History of Information Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews