09.07.2015 Views

The History of INFORMATION SECURITY - Nisa

The History of INFORMATION SECURITY - Nisa

The History of INFORMATION SECURITY - Nisa

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ORDER NOW & SAVE 20% ON THE PRINT VERSION<strong>The</strong> <strong>History</strong> <strong>of</strong><strong>INFORMATION</strong> <strong>SECURITY</strong>A COMPREHENSIVE HANDBOOK• Interdisciplinary• Written by top experts in law, history, computer and information science• ComprehensiveEDITED BYKarl Maria Michael de LeeuwFormerly <strong>of</strong> University <strong>of</strong> Amsterdam, <strong>The</strong> NetherlandsPrint Publication: August 2007ISBN: 0-444-51608-5 / ISBN-13: 978-0-444-51608-4c. 1007 pages • HardbackINTRODUCTORY PRINT PRICE£100.00* / €144.00*PRINT LIST PRICE£125.00 / €180.00* Introductory price expires at the end <strong>of</strong> the third month after publicationComing electronically on ScienceDirect!Select by subject collection or pick and choose any book titleindividually! Online pricing not shown.For more information visit: http://info.sciencedirect.com/booksInformation Security is usually achieved through a mix <strong>of</strong> technical, organizationaland legal measures. <strong>The</strong>se may include the application <strong>of</strong> cryptography, thehierarchical modeling <strong>of</strong> organizations in order to assure confidentiality, orthe distribution <strong>of</strong> accountability and responsibility by law, among interestedparties.<strong>The</strong> history <strong>of</strong> Information Security reaches back to ancient times and startswith the emergence <strong>of</strong> bureaucracy in administration and warfare. Someaspects, such as the interception <strong>of</strong> encrypted messages during World War II,have attracted huge attention, whereas other aspects have remained largelyuncovered. <strong>The</strong>re has never been any effort to write a comprehensive history.This book is intended as a first field-survey. It consists <strong>of</strong> twenty-eightcontributions, written by experts in such diverse fields as computer science,law, or history and political science, dealing with episodes, organisations andtechnical developments that may considered to be exemplary or have played akey role in the development <strong>of</strong> this field.<strong>The</strong> history <strong>of</strong> Information Security is suitable for lecturers and practitionersin Computer Security, Privacy Law, Computer and Law, Business Administrationand Political Science, University Libraries. It is also suitable for lecturers in the<strong>History</strong> <strong>of</strong> Technology, the <strong>History</strong> <strong>of</strong> Computing, the <strong>History</strong> <strong>of</strong> Intelligence andthe Intelligence community.HTTP://BOOKS.ELSEVIER.COM


CONTENTS*PART I. INTELLECTUAL OWNERSHIPLimitations on the Publishing <strong>of</strong> Scientific ResearchIndustrialists, Inventors, and the German Patent System, 1877-1957Reflecting Media. A Cultural <strong>History</strong> <strong>of</strong> Copyright and the Media<strong>The</strong> <strong>History</strong> <strong>of</strong> Copyright Protection <strong>of</strong> Computer S<strong>of</strong>tware:<strong>The</strong> Emancipation <strong>of</strong> a Work <strong>of</strong> Technology Toward a Work <strong>of</strong> Authorship<strong>The</strong> <strong>History</strong> <strong>of</strong> S<strong>of</strong>tware PatentsPART V. PRIVACY- AND EXPORT REGULATIONS<strong>The</strong> Export <strong>of</strong> Cryptography in the 20th Century and the 21st<strong>History</strong> <strong>of</strong> PrivacyMunitions, Wiretaps and MP3s: <strong>The</strong> Changing Interface between Privacyand Encryption Policy in the Information SocietyPART VI. <strong>INFORMATION</strong> WARFARE<strong>The</strong> Information Revolution and the Transformation <strong>of</strong> WarfarePART II. INDENTITY-MANAGEMENTSemiotics <strong>of</strong> Identity Management<strong>History</strong> <strong>of</strong> Document SecurityFrom Frankpledge to Chip and Pin: Identification an Identity in England, 1475-2005<strong>The</strong> Scientific Development <strong>of</strong> Biometrics Over the Last 40 YearsPART III. COMMUNICATION <strong>SECURITY</strong><strong>The</strong> Rise <strong>of</strong> Cryptology in the European RenaissanceCryptology in the Dutch Republic: A Case-StudyIntelligence and the Emergence <strong>of</strong> the Information Society inEighteenth-Century BritainRotor Machines and BombesTunny and Colussus: Breaking the Lorenz Schlüsselzusatz TrafficBoris Hagelin and Crypto AG: Pioneers <strong>of</strong> EncryptionEavesdroppers <strong>of</strong> the Kremlin: KGB Sigint during the Cold WarNational Security Agency: <strong>The</strong> Historiography <strong>of</strong> ConcealmentAn Introduction to Modern CryptographyOnline VersionForthcoming...THE HISTORY OF <strong>INFORMATION</strong> <strong>SECURITY</strong> will be availableonline on ScienceDirect. <strong>The</strong> online version will provide the userwith an unparalleled depth <strong>of</strong> coverage by <strong>of</strong>fering enhancedfeatures including the ability to locate information by browsing,searching, and through the use <strong>of</strong> dynamic linking. (Onlineversion priced separately)Interested in online access to this reference?visit http://info.sciencedirect.com/booksfor contact and purchasing information. Purchasing options areavailable even if you are not an existing ScienceDirect customer!PART IV. COMPUTER <strong>SECURITY</strong>A <strong>History</strong> <strong>of</strong> Computer Security StandardsSecurity ModelsComputer Security through Correctness and TransparencyIT Security and IT Auditing between 1960 and 2000 (A <strong>History</strong> <strong>of</strong> Internet Security (L. DeNardis);Cybercrime*Contents listing is preliminary.Changes may occur prior to publication.Occasionally prices and publicationdates may vary without notice.Online version is priced separately.© 2007 by Elsevier. All Rights Reserved.MT/JB/MAR07

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!