09.07.2015 Views

The History of INFORMATION SECURITY - Nisa

The History of INFORMATION SECURITY - Nisa

The History of INFORMATION SECURITY - Nisa

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CONTENTS*PART I. INTELLECTUAL OWNERSHIPLimitations on the Publishing <strong>of</strong> Scientific ResearchIndustrialists, Inventors, and the German Patent System, 1877-1957Reflecting Media. A Cultural <strong>History</strong> <strong>of</strong> Copyright and the Media<strong>The</strong> <strong>History</strong> <strong>of</strong> Copyright Protection <strong>of</strong> Computer S<strong>of</strong>tware:<strong>The</strong> Emancipation <strong>of</strong> a Work <strong>of</strong> Technology Toward a Work <strong>of</strong> Authorship<strong>The</strong> <strong>History</strong> <strong>of</strong> S<strong>of</strong>tware PatentsPART V. PRIVACY- AND EXPORT REGULATIONS<strong>The</strong> Export <strong>of</strong> Cryptography in the 20th Century and the 21st<strong>History</strong> <strong>of</strong> PrivacyMunitions, Wiretaps and MP3s: <strong>The</strong> Changing Interface between Privacyand Encryption Policy in the Information SocietyPART VI. <strong>INFORMATION</strong> WARFARE<strong>The</strong> Information Revolution and the Transformation <strong>of</strong> WarfarePART II. INDENTITY-MANAGEMENTSemiotics <strong>of</strong> Identity Management<strong>History</strong> <strong>of</strong> Document SecurityFrom Frankpledge to Chip and Pin: Identification an Identity in England, 1475-2005<strong>The</strong> Scientific Development <strong>of</strong> Biometrics Over the Last 40 YearsPART III. COMMUNICATION <strong>SECURITY</strong><strong>The</strong> Rise <strong>of</strong> Cryptology in the European RenaissanceCryptology in the Dutch Republic: A Case-StudyIntelligence and the Emergence <strong>of</strong> the Information Society inEighteenth-Century BritainRotor Machines and BombesTunny and Colussus: Breaking the Lorenz Schlüsselzusatz TrafficBoris Hagelin and Crypto AG: Pioneers <strong>of</strong> EncryptionEavesdroppers <strong>of</strong> the Kremlin: KGB Sigint during the Cold WarNational Security Agency: <strong>The</strong> Historiography <strong>of</strong> ConcealmentAn Introduction to Modern CryptographyOnline VersionForthcoming...THE HISTORY OF <strong>INFORMATION</strong> <strong>SECURITY</strong> will be availableonline on ScienceDirect. <strong>The</strong> online version will provide the userwith an unparalleled depth <strong>of</strong> coverage by <strong>of</strong>fering enhancedfeatures including the ability to locate information by browsing,searching, and through the use <strong>of</strong> dynamic linking. (Onlineversion priced separately)Interested in online access to this reference?visit http://info.sciencedirect.com/booksfor contact and purchasing information. Purchasing options areavailable even if you are not an existing ScienceDirect customer!PART IV. COMPUTER <strong>SECURITY</strong>A <strong>History</strong> <strong>of</strong> Computer Security StandardsSecurity ModelsComputer Security through Correctness and TransparencyIT Security and IT Auditing between 1960 and 2000 (A <strong>History</strong> <strong>of</strong> Internet Security (L. DeNardis);Cybercrime*Contents listing is preliminary.Changes may occur prior to publication.Occasionally prices and publicationdates may vary without notice.Online version is priced separately.© 2007 by Elsevier. All Rights Reserved.MT/JB/MAR07

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!