The History of Information Security

by ;
Format: Hardcover
Pub. Date: 2007-10-02
Publisher(s): Elsevier Science
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $278.25

Buy New

Usually Ships in 8 - 10 Business Days.
$265.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$324.00
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$324.00*

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means. This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field. These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate. It will be seen that during the last thirty years the focus has shifted from military to civilian use. Information Security has assumed a pivotal role in protecting an information infra structure on which businesses and customers, or governments and citizens depend for their day to day dealings. This may safely be attributed to Tofflers Third Wave, the emergence of a society in which information is the key stimulant for economic growth, but the ground work had been laid much earlier, when the state took an interest in managing the information about its citizens. This could occur at the level of registration of the citizenry for the purpose of conscription, voting and taxation, but also as a service to the public by keeping up a legal and administrative frame-work for recording transactions and ownership. The Handbook contains a separate section about identity-management, a topic that only recently has been drawn into the orbit of Information Security, through the privacy issues. Last but not least, the book includes a few contributions about history of intellectual ownership, as expressed in patent- and copyright law. This concept lies at the root of the Information Society and the laws and institutions aimed at enforcing these property rights are, in themselves, part of the armamentarium of Information Security. - Interdisciplinary coverage of the history Information Security - Written by top experts in law, history, computer and information science - First comprehensive work in Information Security

Table of Contents

Prefacep. v
Advisory boardp. vii
Introductionp. 1
Intellectual Ownership
Limitations on the publishing of scientific researchp. 29
Industrialists, inventors and the German Patent System, 1877-1957: A comparative perspectivep. 53
Reflecting media: A cultural history of copyright and the mediap. 83
The history of copyright protection of computer software: The emancipation of a work of technology toward a work of authorshipp. 121
A history of software patentsp. 141
Identity-Management
Semiotics of identity managementp. 167
History of document securityp. 197
From frankpledge to chip and pin: Identification and identity in England, 1475-2005p. 243
The scientific development of biometrics over the last 40 yearsp. 263
Communication Security
The rise of cryptology in the European Renaissancep. 277
Cryptology in the Dutch Republic: A case-studyp. 327
Intelligence and the emergence of the information society in eighteenth-century Britainp. 369
Rotor machines and bombesp. 381
Tunny and Colossus: Breaking the Lorenz Schlusselzusatz trafficp. 447
Boris Hagelin and Crypto AG: Pioneers of encryptionp. 479
Eavesdroppers of the Kremlin: KGB sigint during the Cold Warp. 497
National Security Agency: The historiography of concealmentp. 523
An introduction to modern cryptologyp. 565
Computer Security
A history of computer security standardsp. 595
Security modelsp. 623
Computer security through correctness and transparencyp. 637
IT security and IT auditing between 1960 and 2000p. 655
A history of internet securityp. 681
History of computer crimep. 705
Privacy- and Export Regulations
The export of cryptography in the 20th and the 21st Centuriesp. 725
History of privacyp. 737
Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the Information Societyp. 771
Information Warfare
The Information Revolution and the transformation of warfarep. 821
Biographiesp. 833
Author Indexp. 841
Subject Indexp. 861
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.