
-
Complimentary 7-Day eTextbook Access - Read more
When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
Buy New
Rent Textbook
Rent Digital
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Preface | p. v |
Advisory board | p. vii |
Introduction | p. 1 |
Intellectual Ownership | |
Limitations on the publishing of scientific research | p. 29 |
Industrialists, inventors and the German Patent System, 1877-1957: A comparative perspective | p. 53 |
Reflecting media: A cultural history of copyright and the media | p. 83 |
The history of copyright protection of computer software: The emancipation of a work of technology toward a work of authorship | p. 121 |
A history of software patents | p. 141 |
Identity-Management | |
Semiotics of identity management | p. 167 |
History of document security | p. 197 |
From frankpledge to chip and pin: Identification and identity in England, 1475-2005 | p. 243 |
The scientific development of biometrics over the last 40 years | p. 263 |
Communication Security | |
The rise of cryptology in the European Renaissance | p. 277 |
Cryptology in the Dutch Republic: A case-study | p. 327 |
Intelligence and the emergence of the information society in eighteenth-century Britain | p. 369 |
Rotor machines and bombes | p. 381 |
Tunny and Colossus: Breaking the Lorenz Schlusselzusatz traffic | p. 447 |
Boris Hagelin and Crypto AG: Pioneers of encryption | p. 479 |
Eavesdroppers of the Kremlin: KGB sigint during the Cold War | p. 497 |
National Security Agency: The historiography of concealment | p. 523 |
An introduction to modern cryptology | p. 565 |
Computer Security | |
A history of computer security standards | p. 595 |
Security models | p. 623 |
Computer security through correctness and transparency | p. 637 |
IT security and IT auditing between 1960 and 2000 | p. 655 |
A history of internet security | p. 681 |
History of computer crime | p. 705 |
Privacy- and Export Regulations | |
The export of cryptography in the 20th and the 21st Centuries | p. 725 |
History of privacy | p. 737 |
Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the Information Society | p. 771 |
Information Warfare | |
The Information Revolution and the transformation of warfare | p. 821 |
Biographies | p. 833 |
Author Index | p. 841 |
Subject Index | p. 861 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.