The Information Security Dictionary

Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology

  • Urs E. Gattiker

Part of the The International Series in Engineering and Computer Science book series (SECS, volume 767)

Table of contents

  1. Front Matter
    Pages i-xxxii
  2. A
    Pages 1-31
  3. B
    Pages 32-44
  4. C
    Pages 45-76
  5. D
    Pages 77-105
  6. E
    Pages 106-127
  7. F
    Pages 128-136
  8. G
    Pages 137-138
  9. H
    Pages 139-149
  10. I
    Pages 150-182
  11. J
    Pages 183-189
  12. K
    Pages 190-192
  13. L
    Pages 193-198
  14. M
    Pages 199-218
  15. N
    Pages 219-222
  16. O
    Pages 223-226
  17. P
    Pages 227-260
  18. Q
    Pages 261-262
  19. R
    Pages 263-281
  20. S
    Pages 282-318

About this book

Introduction

The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing.
Although it is difficult for an IT professional or an IT student to keep aware of the current terminology being practiced today, the Dictionary of Information Security presents cutting-edge information on the most recent terms in use in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology and other disciplines, this IT Security Dictionary is a reference tool that should become part of any professional and IT student's library.
The Dictionary of Information Security is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering and information sciences.

Keywords

IT security Information Technology (IT) auditing computer computer science computer security cryptography data security database information information system management privacy security system administrator

Authors and affiliations

  • Urs E. Gattiker
    • 1
    • 2
  1. 1.Information Security this WeekDenmark
  2. 2.International School of New Media (ISNM)University of LübeckGermany

Bibliographic information

  • DOI https://doi.org/10.1007/b115731
  • Copyright Information Springer Science + Business Media, Inc. 2004
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4020-7889-7
  • Online ISBN 978-1-4020-7927-6
  • Series Print ISSN 0893-3405
  • About this book
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Electronics
Telecommunications
Consumer Packaged Goods
Energy, Utilities & Environment
Aerospace