Book Series on Information Security and Privacy

Artech House is a leading scientific publisher because of its ability to produce well-written, timely books that reflect current advances in engineering and computer technology. In this tradition, Artech House proudly presents its book series on information security and privacy (former computer security).

Aims and Scope

  "Everything should be made as simple as possible, but not simpler"   (Albert Einstein)

The aim of the series is to publish technical books on all aspects related to information security and privacy. The target audience includes researchers, instructors and graduate students in computer science or electrical engineering, technical managers, consultants, analysts, software developers, as well as computer and network practitioners who care about the security of the systems and networks they administer.

Available Books

  1. Rolf Oppliger, Security Technologies for the World Wide Web, ISBN 978-1-58053-045-3, 2000, 444 pp.
  2. Stefan Katzenbeisser and Fabien Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digital Watermarking, ISBN 978-1-58053-035-4, 2000, 240 pp.
  3. Vesna Hassler, Security Fundamentals for E-Commerce, ISBN 978-1-58053-108-5, 2001, 416 pp.
  4. Rolf Oppliger, Secure Messaging with PGP and S/MIME, ISBN 978-1-58053-161-0, 2001, 332 pp.
  5. Sheila Frankel, Demystifying the IPsec Puzzle, ISBN 978-1-58053-079-8, 2001, 296 pp.
  6. Donal O'Mahony, Michael Peirce and Hitesh Tewari, Electronic Payment Systems for E-Commerce, Second Edition, ISBN 978-1-58053-268-6, 2001, 368 pp.
  7. Jianying Zhou, Non-repudiation in Electronic Commerce, ISBN 978-1-58053-247-1, 2001, 216 pp.
  8. Michael A. Caloyannides, Computer Forensics and Privacy, ISBN 978-1-58053-283-9, 2001, 394 pp.
  9. Vesna Hassler, Mikhail Gordeev, Martin Manninger, Christoph Müller and Pedrick Moore, Java Card for E-Payment Applications, ISBN 978-1-58053-291-4, 2002, 382 pp.
  10. Rolf Oppliger, Internet and Intranet Security, Second Edition, ISBN 978-1-58053-166-5, 2002, 430 pp.
  11. Thomas D. Tarman and Edward. L. Witzke, Implementing Security for ATM Networks, ISBN 978-1-58053-293-8, 2002, 318 pp.
  12. Ulrich Lang and Rudolf Schreiner, Developing Secure Distributed Systems with CORBA, ISBN 978-1-58053-295-2, 2002, 332 pp.
  13. Cristian Radu, Implementing Electronic Card Payment Systems, ISBN 978-1-58053-305-8, 2003, 464 pp.
  14. Rolf Oppliger, Security Technologies for the World Wide Web, Second Edition, ISBN 978-1-58053-348-5, 2003, 444 pp.
  15. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, and Rodney D. McKemmish, Computer and Intrusion Forensics, ISBN 978-1-58053-369-0, 2003, 420 pp.
  16. David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli, Role-based Access Controls, ISBN 978-1-58053-324-9, 2003, 338 pp.
  17. Thomas Hardjono and Lakshminath R. Dondeti, Multicast and Group Security, ISBN 978-1-58053-342-3, 2003, 334 pp.
  18. Michael Arnold, Martin Schmucker, and Stephen D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, ISBN 978-1-58053-111-5, 2003, 296 pp.
  19. Jose Nazario, Defense and Detection Strategies against Internet Worms, ISBN 978-1-58053-537-3, 2003, 318 pp.
  20. Christian Gehrmann, Joakim Persson, and Ben Smeets, Bluetooth Security, ISBN 978-1-58053-504-5, 2004, 222 pp.
  21. C. Warren Axelrod, Outsourcing Information Security, ISBN 978-1-58053-531-1, 2004, 266 pp.
  22. Michael A. Caloyannides, Privacy Protection and Computer Forensics, Second Edition, ISBN 978-1-58053-830-5, 2004, 364 pp.
  23. Alexander W. Dent and Chris J. Mitchell, User's Guide to Cryptography and Standards, ISBN 978-1-58053-530-4, 2005, 402 pp.
  24. Rolf Oppliger, Contemporary Cryptography, ISBN 978-1-58053-642-4, 2005, 510 pp.
  25. Thomas Hardjono and Lakshminath R. Dondeti, Security in Wireless LANs und MANs, ISBN 978-1-58053-755-1, 2005, 266 pp.
  26. David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli, Role-based Access Controls, Second Edition, ISBN 978-1-59693-113-8, 2007, 418 pp.
  27. Edward Humphreys, Implementing the ISO/IEC 27000 Information Security Management System Standard, ISBN 978-1-59693-172-5, 2007, 290 pp.
  28. Edward J. Coyne and John M. Davis, Role Engineering for Enterprise Security Management, ISBN 978-1-59693-218-0, 2008, 224 pp.
  29. Luther H. Martin, Introduction to Identity-Based Encryption, ISBN 978-1-59693-238-8, 2008, 254 pp.
  30. Javier Lopez, Steven Furnell, Sokratis Katsikas, and Ahmed Patel (Eds.), Securing Information and Communication Systems: Principles, Technologies and Applications, ISBN 978-1-59693-228-9, 2008, 289 pp.
  31. Ari Takanen, Jared D. DeMott, and Charles Miller, Fuzzing for Software Security Testing and Quality Assurance, ISBN 978-1-59693-214-2, 2008, 230 pp.
  32. C. Warren Axelrod, Jennifer Bayuk, and Daniel Schutzer (Eds.), Enterprise Information Security and Privacy, ISBN 978-1-59693-190-9, 2009, 260 pp.
  33. Rolf Oppliger, SSL and TLS: Theory and Practice, ISBN 978-1-59693-447-4, 2009, 284 pp.
  34. Elisa Bertino, and Kenji Takahashi, Identity Management: Concepts, Technologies, and Systems, ISBN 978-1-60807-039-8, 2011, 194 pp.
  35. Rolf Oppliger, Contemporary Cryptography, Second Edition, ISBN 978-1-60807-145-6, 2011, 612 pp.
  36. Shimon K. Modi, Biometrics in Identity Management: Concepts to Applications, ISBN 978-1-60807-017-6, 2011, 296 pp.
  37. C. Warren Axelrod, Engineering Safe and Secure Software Systems, ISBN 978-1-60807-472-3, 2012, 350 pp.
  38. Stefan Rass and Daniel Slamanig, Cryptography for Security and Privacy in Cloud Computing, ISBN 978-1-60807-575-1, 2013, 260 pp.
  39. Rolf Oppliger, Secure Messaging on the Internet, ISBN 978-1-60807-717-5, 2014, 282 pp.
  40. Flavio Lombardi, and Roberto Di Pietro, Security for Cloud Computing, 978-1-60807-989-6, 2015, 184 pp.
  41. Stefan Katzenbeisser, and Fabien Petitcolas (Eds.), Information Hiding, 978-1-60807-928-5, 2015, approx. 312 pp.
  42. Edward Humphreys, Implementing the ISO/IEC 27001:2013 ISMS Standard, 978-1-60807-930-8, 2016, 224 pp.
  43. Rolf Oppliger, SSL and TLS: Theory and Practice, Second Edition, 978-1-60807-998-8, 2016, 304 pp.

Scheduled Books

Contact Information


Series Editor

Rolf Oppliger, Ph.D.

eSECURITY Technologies Rolf Oppliger
Breichtenstrasse 18
CH-3074 Muri b. Bern
Switzerland
Phone +41 79 654 84 37
rolf.oppliger@esecurity.ch


Senior Acquisitions Editor

North and South America, Australia and New Zealand

Stephen Solomon

Artech House
685 Canton Street
Norwood, MA 02062
United States
Phone +1 781-769-9750
(Toll-free: 800-225-9977)
Mobile +1 978-408-8872
Fax +1 781-769-6334
ssolomon@artechhouse.com


Senior Acquisitions Editor

Europe, Middle East, Africa and Asia

Aileen Storry

Artech House
16 Sussex Street
London
SW1V 4RW
United Kingdom
Phone +44 (0)20 7596 8751
Fax +44 (0)20 7630 0166
astorry@artechhouse.co.uk

© 1999-2016 eSECURITY Technologies Rolf Oppliger