Skip to main content
Book cover

The Information Security Dictionary

Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology

  • Book
  • © 2004

Overview

  • Provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms)
  • Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines

Part of the book series: The Springer International Series in Engineering and Computer Science (SECS, volume 767)

  • 6089 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 165.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (25 chapters)

Keywords

About this book

Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection terms, without causing much damage to the usually slim student pocketbook. This dictionary can help non-specialistreaders better understand the infor- tion security issues encountered in their work or studying for their certification examination or whilst doing a practical assignment as part of a workshop. This book is also essential to a reference collection for an organization’s system personnel. Special attention is paid to terms which most often prevent educated readers from understanding journal articles and books in cryptology, computing science, and information systems, in addition to applied fields that build on those disciplines, such as system design, security auditing, vulnera- lity testing, and role-based access management. The dictionary provides defi- tions that enable readers to get through a difficult article or passage. We do not, for the most part, directly explain how to conduct research or how to implement the terms briefly described.

Authors and Affiliations

  • Information Security this Week, Denmark

    Urs E. Gattiker

  • International School of New Media (ISNM), University of Lübeck, Germany

    Urs E. Gattiker

Bibliographic Information

Publish with us