Information Security in Research and Business

259,00 €
+ 5,99 € Envío

Information Security in Research and Business

  • Marca: Unbranded
Vendido por:

Information Security in Research and Business

  • Marca: Unbranded

259,00 €

En existencias
+ 5,99 € Envío

Política de devoluciones de 14 días

Vendido por:

259,00 €

En existencias
+ 5,99 € Envío

Política de devoluciones de 14 días

Métodos de pago:

Descripción

Information Security in Research and Business

1 Information security challenges for the next millenium. - 2 Selection of secure single sign-on solutions for heterogeneous computing environments. - 3 A formal model to aid documenting and harmonizing of information security requirements. - 4 A compile-time model for safe information flow in object-oriented databases. - 5 Deriving Authorizations from Process Analysis in Legacy Information Systems. - 6 The Role of Government in Creating the IT Security Infrastructure: Builder or Bystander?. - 7 Code of Practice: A Standard for Information Security Management. - 8 Can security baselines replace risk analysis?. - 9 gGSS-API: a group enhanced generic security service. - 10 Electronic document exchange in Sweden the legal aspects. - 11 An attack detection system for secure computer systems outline of the solution. - 12 A taxonomy and overview of information security experiments. - 13 Pseudonymous audit for privacy enhanced intrusion detection. - 14 Individual management of personal reachability in mobile communication. - 15 New vistas on info-system security. - 16 A common criteria framework for the evaluation of information technology systems security. - 17 A methodology for accrediting a commercial distributed database. - 18 A comparison of schemes for certification authorities/trusted third parties. - 19 How to trust systems. - 20 Integrating information security in the development of telematics systems. - 21 Developing secure applications: a systematic approach. - 22 Controlling Internet access at an educational institution. - 23 Analysis of Java security and hostile applets. - 24 New organizational forms for information security management. - 25 Security when outsourcing: concepts constructs compliance. - 26 The IFIP TC11 position on cryptopolicies. - 27 Towards an holistic viewof enterprise ICT security and safety. - 28 A taxonomy of electronic cash schemes. - 29 Large scale elections by coordinating electoral colleges. - 30 MVS-SAT: a security administration tool to support SMF protocol data evaluation. - 31 security requirements and solutions in distributed electronic health records. - 32 ODESSA a new approach to healthcare risk analysis. - 33 A comprehensive need-to-know access control system and its application for medical information systems. - 34 The future of networks and network security. - 35 Securing communications over ATM networks. - 36 Non-intrusive authentication. - 37 Roaming security agents enabling intelligent access control and network protection. - Index of contributors. - Keyword index. Language: English
  • Marca: Unbranded
  • Categoría: Informática e Internet
  • Idioma: English
  • Número de páginas: 472
  • Fecha de publicación: 2013/06/05
  • Artista: Louise Yngström
  • Editor / Marca: Springer
  • Formato: Paperback
  • Nº de Fruugo : 450897517-950608289
  • ISBN: 9781475754810

Entrega y devolución

Enviado en un plazo de 6 días

  • STANDARD: 5,99 € - Entrega entre mié 21 enero 2026–lun 26 enero 2026

Envío desde Reino Unido.

Hacemos todo lo posible para asegurarnos de que se le entreguen los productos que pida en su totalidad y de acuerdo con sus especificaciones. Sin embargo, si recibe un pedido incompleto o artículos diferentes a los que pidió, o hay alguna otra razón por la que no está satisfecho con el pedido, puede devolver el mismo o cualquier producto incluido en él y obtener un reembolso completo por los artículos. Vea la política de devolución completa