Book ID: CBB001180686

The history of information security: A comprehensive handbook (2007)

unapi

Leeuw, Karl de (Editor)
Bergstra, J. A. (Editor)


Elsevier


Publication Date: 2007
Physical Details: xi + 887 pp.; ill.
Language: English

Description Contents: Introduction / K. de Leeuw -- Limitations on the publishing of scientific research / J. Meadows -- Industrialists, inventors and the German patent system, 1877-1957: A comparative perspective / K. Gispen -- Reflecting media: A cultural history of copyright and the media / R. Verhoogt, C. Schriks -- The history of copyright protection of computer software: The emancipation of a work of technology toward a authorship / M. de Cock Buning -- A history of software patents / R. Plotkin -- Semiotics of identity management / P. Wisse -- History of document security / K.J. Schell -- From frankpledge to chip and pin: Identification and identity in England, 1475-2005 / E. Higgs -- The scientific development of biometrics over the last 40 years / J.L. Wayman -- The rise of crptology in the European renaissance / G. F. Strasser -- Cryptology in the Dutch republic: A case study / K. de Leeuw -- Intelligence and the emergence of the information society in eighteenth-century Britain / J. Black -- Rotor machines and bombes / F.L. Bauer -- Tunny and colossus: Breaking the Lorenz Schlüsselzuatz traffic / B. J. Copeland -- Boris Hagelin and Crypto AG: pioneers of encryption / S. Frik -- Eavesdroppers of the Kremlin: KGB sigint during the Cold War / M. Aid -- National security agency: The historiography of concealment / J. Fitsankis -- An introduction to modern cryptology / B. Preneel -- A history of computer security standards / J.R. Yost -- Security models / D. Gollmann -- Computer security through correctness and transparency / H. Meijer ... [et. al] -- IT security and IT auditing between 1960 and 2000 / M. van Biene-Hershey -- A history of internet security / L. DeNardis -- History of computer crime / S. W. Brenner -- The export of cryptography in the 20th and the 21st centuries / W. Diffie, S. Landau -- History of privacy / J. Holvast -- Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the information security / A. Chalesworth -- The information revolution and the transformation of warfare / D. Kuehl. (from WorldCat)


Includes Chapters

Chapter Yost, Jeffrey R. (2007) History of computer security standards. In: The history of information security: A comprehensive handbook (p. 595). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB001180686/

Similar Citations

Chapter Yost, Jeffrey R.; (2007)
History of computer security standards (/isis/citation/CBB001180687/)

Article Masco, Joseph; (2002)
Lie detectors: On secrets and hypersecurity in Los Alamos (/isis/citation/CBB001180562/)

Article Jack, Caroline; (2016)
Meaning and Persuasion: The Personal Computer and Economic Education (/isis/citation/CBB148010275/)

Article Roegel, Denis; (2016)
Anecdote: Before Torchi and Schwilgué, There Was White (/isis/citation/CBB576394582/)

Book Subrata Dasgupta; (2014)
It Began with Babbage: The Genesis of Computer Science (/isis/citation/CBB624612522/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Review Salem Elzway; (2017)
Review of "The Outsourcer: The story of India's IT revolution" (/isis/citation/CBB610334077/)

Article Guy C. Fedorkow; (January-March 2021)
Recovering Software for the Whirlwind Computer (/isis/citation/CBB869829437/)

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/)

Article Fidler, Bradley; Currie, Morgan; (2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps (/isis/citation/CBB826738719/)

Chapter Misa, Thomas J.; (2009)
Organizing the history of computing: Lessons learned at the Charles Babbage Institute (/isis/citation/CBB001180670/)

Article Janet Toland; (April-June 2021)
Consortium Computing and Time Slicing in the Banking Sector: Databank Systems Ltd New Zealand (/isis/citation/CBB565212269/)

Article Park, Dongoh; (2016)
The Korean Character Code: A National Controversy, 1987-1995 (/isis/citation/CBB705437460/)

Article Akita, Katsuji; Hasegawa, Yutaka; (2016)
History of COMTRAC: Development of the Innovative Traffic-Control System for Shinkansen (/isis/citation/CBB587529436/)

Book Trogemann, Georg; Nitussov, Alexander Y; Ernst, Wolfgang; (2001)
Computing in Russia: The history of computer devices and information technology revealed (/isis/citation/CBB001180125/)

Article James W. Cortada; (April-June 2021)
Preserving the Past by Industry Participants (/isis/citation/CBB451216991/)

Authors & Contributors
Fidler, Bradley Reuben
Guy C. Fedorkow
Elzway, Salem
Currie, Morgan
Park, Dongoh
Hasegawa, Yutaka
Concepts
History of Computing
Software
Computers and computing
Software engineering
Security Systems
Data Processing
Time Periods
20th century
21st century
20th century, late
19th century
Places
United States
Sweden
Russia
New Zealand
Japan
New Mexico (U.S.)
Institutions
Charles Babbage Institute, University of Minnesota
Los Alamos Scientific Laboratory
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment