Book ID: CBB001180686

The history of information security: A comprehensive handbook (2007)


Leeuw, Karl de (Editor)
Bergstra, J. A. (Editor)


Publication Date: 2007
Physical Details: xi + 887 pp.; ill.
Language: English

Description Contents: Introduction / K. de Leeuw -- Limitations on the publishing of scientific research / J. Meadows -- Industrialists, inventors and the German patent system, 1877-1957: A comparative perspective / K. Gispen -- Reflecting media: A cultural history of copyright and the media / R. Verhoogt, C. Schriks -- The history of copyright protection of computer software: The emancipation of a work of technology toward a authorship / M. de Cock Buning -- A history of software patents / R. Plotkin -- Semiotics of identity management / P. Wisse -- History of document security / K.J. Schell -- From frankpledge to chip and pin: Identification and identity in England, 1475-2005 / E. Higgs -- The scientific development of biometrics over the last 40 years / J.L. Wayman -- The rise of crptology in the European renaissance / G. F. Strasser -- Cryptology in the Dutch republic: A case study / K. de Leeuw -- Intelligence and the emergence of the information society in eighteenth-century Britain / J. Black -- Rotor machines and bombes / F.L. Bauer -- Tunny and colossus: Breaking the Lorenz Schlüsselzuatz traffic / B. J. Copeland -- Boris Hagelin and Crypto AG: pioneers of encryption / S. Frik -- Eavesdroppers of the Kremlin: KGB sigint during the Cold War / M. Aid -- National security agency: The historiography of concealment / J. Fitsankis -- An introduction to modern cryptology / B. Preneel -- A history of computer security standards / J.R. Yost -- Security models / D. Gollmann -- Computer security through correctness and transparency / H. Meijer ... [et. al] -- IT security and IT auditing between 1960 and 2000 / M. van Biene-Hershey -- A history of internet security / L. DeNardis -- History of computer crime / S. W. Brenner -- The export of cryptography in the 20th and the 21st centuries / W. Diffie, S. Landau -- History of privacy / J. Holvast -- Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the information security / A. Chalesworth -- The information revolution and the transformation of warfare / D. Kuehl. (from WorldCat)

Includes Chapters

Chapter Yost, Jeffrey R. (2007) History of computer security standards. In: The history of information security: A comprehensive handbook (p. 595). unapi

Citation URI

Similar Citations

Chapter Yost, Jeffrey R.; (2007)
History of computer security standards (/isis/citation/CBB001180687/) unapi

Article Masco, Joseph; (2002)
Lie detectors: On secrets and hypersecurity in Los Alamos (/isis/citation/CBB001180562/) unapi

Book Subrata Dasgupta; (2014)
It Began with Babbage: The Genesis of Computer Science (/isis/citation/CBB624612522/) unapi

Article Roegel, Denis; (2016)
Anecdote: Before Torchi and Schwilgué, There Was White (/isis/citation/CBB576394582/) unapi

Review Salem Elzway; (2017)
Review of "The Outsourcer: The story of India's IT revolution" (/isis/citation/CBB610334077/) unapi

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/) unapi

Article Jack, Caroline; (2016)
Meaning and Persuasion: The Personal Computer and Economic Education (/isis/citation/CBB148010275/) unapi

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/) unapi

Chapter Seidel, Robert; (2001)
Enrico Fermi, High-energy physics and high-speed computing (/isis/citation/CBB001180428/) unapi

Article Peters, Benjamin; (2008)
Betrothal and betrayal: The Soviet translation of Norbert Wiener's early cybernetics (/isis/citation/CBB001180043/) unapi

Book Latil, Pierre de; (1957)
Thinking by machine: A study of cybernetics (/isis/citation/CBB001180074/) unapi

Chapter Misa, Thomas J.; (2009)
Organizing the history of computing: Lessons learned at the Charles Babbage Institute (/isis/citation/CBB001180670/) unapi

Book Jones, C.B.; Lloyd, J.L.; (2011)
Dependable and Historic Computing: Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday (/isis/citation/CBB511443626/) unapi

Article Fidler, Bradley; Currie, Morgan; (2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps (/isis/citation/CBB826738719/) unapi

Article Guy C. Fedorkow; (January-March 2021)
Recovering Software for the Whirlwind Computer (/isis/citation/CBB869829437/) unapi

Article Park, Dongoh; (2016)
The Korean Character Code: A National Controversy, 1987-1995 (/isis/citation/CBB705437460/) unapi

Article Akita, Katsuji; Hasegawa, Yutaka; (2016)
History of COMTRAC: Development of the Innovative Traffic-Control System for Shinkansen (/isis/citation/CBB587529436/) unapi

Authors & Contributors
Fidler, Bradley Reuben
Peters, Benjamin
Latil, Pierre de
Seidel, Robert
Andersen, Håkon With
Masco, Joseph
IEEE Annals of the History of Computing
International Journal of Communications
Scientia Yugoslavica
Public Culture
Houghton Mifflin
Oxford University Press
History of Computing
Computer industry
Security Systems
Information technology
Wiener, Norbert
Fermi, Enrico
White, James
Babbage, Charles
Time Periods
20th century
21st century
20th century, late
19th century
United States
Soviet Union
New Mexico (U.S.)
Great Britain
Los Alamos Scientific Laboratory
Charles Babbage Institute, University of Minnesota

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment