Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier,
    UID:
    almahu_9949697894502882
    Format: 1 online resource (901 p.)
    ISBN: 1-281-22735-8 , 9786611227357 , 0-08-055058-4
    Content: Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas othe
    Note: Includes index. , Front cover; The History of Information Security; Copyright page; Preface; Advisory Board; Contents; Chapter 1. Introduction; 1.1 An example from Dutch history; 1.2 Definitions, topics, aim; 1.3 Historiography; 1.4 Limitations; 1.5 Intellectual ownership; 1.6 Identity management; 1.7 Cryptology and communication security; 1.8 Computer security; 1.9 Privacy and export regulations; 1.10 Information warfare; 1.11 Concluding remarks; References; Part 1. Intellectual Ownership; Chapter 2. Limitations on the publishing of scientific research; 2.1 Introduction; 2.2 Authors and publishing , 2.3 Editorial activities2.4 Other forms of publication; 2.5 Grey literature and restrictions on availability; 2.6 Conclusion; References; Chapter 3. Industrialists, Inventors and the German Patent System, 1877-1957: A Comparative Perspectivet1; 3.1 The case for patents: Origins and theories; 3.2 Inventor rights in the United States and Germany; 3.3 Werner Siemens and the peculiarities of the German patent code; 3.4 Technological culture and the inventor's reward; 3.5 The inventor debate in Germany and national socialist inventor policy; References , Chapter 4. Reflecting media: A cultural history of copyright and the media4.1 Introduction; 4.2 Text; 4.3 Visual; 4.4 Audio; 4.5 Audio-visual; 4.6 Multimedia; 4.7 Conclusions; References; Chapter 5. The History of Copyright Protection of Computer Software The Emancipation of a Work of Technology Toward a Work of Authorship; 5.1 Introduction; 5.2 Framework: technological evolution; 5.3 The United States of America; 5.4 Germany; 5.5 The Netherlands; 5.6 Developments in the international arena; 5.7 Summary and conclusions; References; Chapter 6. A History of Software Patents; 6.1 Introduction , 6.2 Patent law primer6.3 A pre-history of software patents; 6.4 Early software patents; 6.5 Recent software patents; 6.6 The present; 6.7 Conclusions; Acknowledgement; References; Part2. Identity-Management; Chapter 7. Semiotics of identity management; 7.1 Identifying assumptions; 7.2 Identity in enneadic dynamics; 7.3 Social practices in identity management; References; Chapter 8. History of document security; 8.1 Introduction; 8.2 The first period until 1800, block printing, the invention of typography and the genes of paper currency; 8.3 From 1800 until 1940, security printing matures , 8.4 The evolutionary years from 1940-1980. Classifying counterfeiters and the arrival of matured security features8.5 From 1980 until the beginning of the 21st century. The influence of the digital revolution; 8.6 The history of substrate-based security features; 8.7 The history of security features added to the substrate; 8.8 A few comments on the role of printing ink within the history of document security; 8.9 Retrospection; 8.10 Epilogue; References; Chapter 9. From Frankpledge to Chip and Pin: Identification and Identity in England, 1475-2005; 9.1 Introduction , 9.2 Identifying the Great and the Good, and the Insignificant and the Bad, in early-modern England , English
    Additional Edition: ISBN 0-444-51608-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages