Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
|
Buy Now
The History of Information Security - A Comprehensive Handbook (Hardcover)
Loot Price: R4,930
Discovery Miles 49 300
|
|
The History of Information Security - A Comprehensive Handbook (Hardcover)
Expected to ship within 12 - 17 working days
|
Information Security is usually achieved through a mix of
technical, organizational and legal measures. These may include the
application of cryptography, the hierarchical modeling of
organizations in order to assure confidentiality, or the
distribution of accountability and responsibility by law, among
interested parties.
The history of Information Security reaches back to ancient times
and starts with the emergence of bureaucracy in administration and
warfare. Some aspects, such as the interception of encrypted
messages during World War II, have attracted huge attention,
whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history.
This is most unfortunate, because Information Security should be
perceived as a set of communicating vessels, where technical
innovations can make existing legal or organisational frame-works
obsolete and a breakdown of political authority may cause an
exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of
twenty-eight contributions, written by experts in such diverse
fields as computer science, law, or history and political science,
dealing with episodes, organisations and technical developments
that may considered to be exemplary or have played a key role in
the development of this field.
These include: the emergence of cryptology as a discipline during
the Renaissance, the Black Chambers in 18th century Europe, the
breaking of German military codes during World War II, the
histories of the NSA and its Soviet counterparts and contemporary
cryptology. Other subjects are: computer security standards,
viruses and worms on the Internet, computer transparency and free
software, computer crime, export regulations for encryption
software and the privacy debate.
- Interdisciplinary coverage of the history Information
Security
- Written by top experts in law, history, computer and information
science
- First comprehensive work in Information Security
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.