Descripción
Information Security in Research and Business
1 Information security challenges for the next millenium. - 2 Selection of secure single sign-on solutions for heterogeneous computing environments. - 3 A formal model to aid documenting and harmonizing of information security requirements. - 4 A compile-time model for safe information flow in object-oriented databases. - 5 Deriving Authorizations from Process Analysis in Legacy Information Systems. - 6 The Role of Government in Creating the IT Security Infrastructure: Builder or Bystander?. - 7 Code of Practice: A Standard for Information Security Management. - 8 Can security baselines replace risk analysis?. - 9 gGSS-API: a group enhanced generic security service. - 10 Electronic document exchange in Sweden the legal aspects. - 11 An attack detection system for secure computer systems outline of the solution. - 12 A taxonomy and overview of information security experiments. - 13 Pseudonymous audit for privacy enhanced intrusion detection. - 14 Individual management of personal reachability in mobile communication. - 15 New vistas on info-system security. - 16 A common criteria framework for the evaluation of information technology systems security. - 17 A methodology for accrediting a commercial distributed database. - 18 A comparison of schemes for certification authorities/trusted third parties. - 19 How to trust systems. - 20 Integrating information security in the development of telematics systems. - 21 Developing secure applications: a systematic approach. - 22 Controlling Internet access at an educational institution. - 23 Analysis of Java security and hostile applets. - 24 New organizational forms for information security management. - 25 Security when outsourcing: concepts constructs compliance. - 26 The IFIP TC11 position on cryptopolicies. - 27 Towards an holistic viewof enterprise ICT security and safety. - 28 A taxonomy of electronic cash schemes. - 29 Large scale elections by coordinating electoral colleges. - 30 MVS-SAT: a security administration tool to support SMF protocol data evaluation. - 31 security requirements and solutions in distributed electronic health records. - 32 ODESSA a new approach to healthcare risk analysis. - 33 A comprehensive need-to-know access control system and its application for medical information systems. - 34 The future of networks and network security. - 35 Securing communications over ATM networks. - 36 Non-intrusive authentication. - 37 Roaming security agents enabling intelligent access control and network protection. - Index of contributors. - Keyword index. Language: English
-
Nº de Fruugo :
450897517-950608289
-
ISBN:
9781475754810
Entrega y devolución
Enviado en un plazo de 6 días
Envío desde Reino Unido.
Hacemos todo lo posible para asegurarnos de que se le entreguen los productos que pida en su totalidad y de acuerdo con sus especificaciones. Sin embargo, si recibe un pedido incompleto o artículos diferentes a los que pidió, o hay alguna otra razón por la que no está satisfecho con el pedido, puede devolver el mismo o cualquier producto incluido en él y obtener un reembolso completo por los artículos. Vea la política de devolución completa