Descrizione
Information Security in Research and Business
1 Information security challenges for the next millenium. - 2 Selection of secure single sign-on solutions for heterogeneous computing environments. - 3 A formal model to aid documenting and harmonizing of information security requirements. - 4 A compile-time model for safe information flow in object-oriented databases. - 5 Deriving Authorizations from Process Analysis in Legacy Information Systems. - 6 The Role of Government in Creating the IT Security Infrastructure: Builder or Bystander?. - 7 Code of Practice: A Standard for Information Security Management. - 8 Can security baselines replace risk analysis?. - 9 gGSS-API: a group enhanced generic security service. - 10 Electronic document exchange in Sweden the legal aspects. - 11 An attack detection system for secure computer systems outline of the solution. - 12 A taxonomy and overview of information security experiments. - 13 Pseudonymous audit for privacy enhanced intrusion detection. - 14 Individual management of personal reachability in mobile communication. - 15 New vistas on info-system security. - 16 A common criteria framework for the evaluation of information technology systems security. - 17 A methodology for accrediting a commercial distributed database. - 18 A comparison of schemes for certification authorities/trusted third parties. - 19 How to trust systems. - 20 Integrating information security in the development of telematics systems. - 21 Developing secure applications: a systematic approach. - 22 Controlling Internet access at an educational institution. - 23 Analysis of Java security and hostile applets. - 24 New organizational forms for information security management. - 25 Security when outsourcing: concepts constructs compliance. - 26 The IFIP TC11 position on cryptopolicies. - 27 Towards an holistic viewof enterprise ICT security and safety. - 28 A taxonomy of electronic cash schemes. - 29 Large scale elections by coordinating electoral colleges. - 30 MVS-SAT: a security administration tool to support SMF protocol data evaluation. - 31 security requirements and solutions in distributed electronic health records. - 32 ODESSA a new approach to healthcare risk analysis. - 33 A comprehensive need-to-know access control system and its application for medical information systems. - 34 The future of networks and network security. - 35 Securing communications over ATM networks. - 36 Non-intrusive authentication. - 37 Roaming security agents enabling intelligent access control and network protection. - Index of contributors. - Keyword index. Language: English
-
ID Fruugo:
450897517-950608289
-
ISBN:
9781475754810
Consegne e Resi
Spedito entro 6 giorni
Spedizione da Regno Unito.
Facciamo del nostro meglio per assicurare che i prodotti che ordini vengano consegnati integralmente e secondo le tue indicazioni. Tuttavia, nel caso dovessi ricevere un ordine incompleto, oppure articoli differenti rispetto a quelli che hai ordinato, o se c'è qualche altro motivo per il quale non sei soddisfatto dell'ordine, puoi effettuare il reso dell'ordine, o qualsiasi prodotto incluso nell'ordine e ricevere un rimborso completo per gli articoli. Visualizza la politica di reso completa