Wonder Club world wonders pyramid logo
×

Information Security For Global Information Infrastructures Book

Information Security For Global Information Infrastructures
Information Security For Global Information Infrastructures, This book presents a state-of-the-art review of current  perspectives in information security, focusing on technical as well as  functional issues. It contains the selected proceedings of the  Sixteenth Annual Working Conference on Information Security (S, Information Security For Global Information Infrastructures has a rating of 3 stars
   2 Ratings
X
Information Security For Global Information Infrastructures, This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues. It contains the selected proceedings of the Sixteenth Annual Working Conference on Information Security (S, Information Security For Global Information Infrastructures
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $299.00
Original Magazine
Physical Format

Sold Out

  • Information Security For Global Information Infrastructures
  • Written by author Sihan Qing
  • Published by Springer-Verlag New York, LLC, July 2000
  • This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues. It contains the selected proceedings of the Sixteenth Annual Working Conference on Information Security (S
  • This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues. It contains the selected proceedings of the Sixteenth Annual Working Conference on Information Security (SEC2
Buy Digital  USD$299.00

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface
Acknowledgements
IT Security Certification and Criteria1
Information Security: Process Evaluation and Product Evaluation11
Managing Information Security in Healthcare - an Action Research Experience19
From Trusted Information Security Controls to a Trusted Information Security Environment29
A Qualitative Approach to Information Availability37
A Postgraduate Programme on Information and Communication Systems Security49
Information Security Management through Measurement59
The Defense Framework for Large-scale Computer Network System69
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies79
Independent Policy Oriented Layering of Security Services89
Reducing Computer Fraud through Situational Crime Prevention99
Policies for Construction of Information Systems' Security Guidelines: Five Approaches111
'DNA-proofing' for Computer Systems - A New Approach to Computer Security?121
Using Smart Cards in an Educational Environment: Services and Security Features131
MASS: Model for an Auditing Security System141
Classifying Information for External Release151
Using Mobile Agent Results to Create Hard-To-Detect Computer Viruses161
CARDS: A Distributed System for Detecting Coordinated Attacks171
Robust Audio Watermarking based on Secure Spread Spectrum and Auditory Perception Model181
A Simple and Efficient Approach to Verifying Cryptographic Protocols191
Power Analysis of RC6 and Serpent201
A Simple Algorithm for Computing Several Sequences Synthesis211
GSFS - A New Group-Aware Cryptographic File System221
Robustness-Agile Encryptor for ATM Networks231
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties241
A New Serial/Parallel Architecture for a Low Power Modular Multiplier251
Defending Against Null Calls Stream Attacks by Using a Double-Threshold Dynamic Filter261
A Multi-party Non-repudiation Protocol271
Analysis and Design of E-voting Protocol281
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community291
Towards Network Denial of Service Resistant Protocols301
A Generic Graphical Specification Environment for Security Protocol Modelling311
Anonymous Electronic Voting System with Non-Transferable Voting Passes321
Improving Packet Filters Management through Automatic and Dynamic Schemes331
A Context-Sensitive Access Control Model and Prototype Implementation341
Regulating Access to Semistructured Information on the Web351
On the Practical Feasibility of Secure Distributed Computing: A Case Study361
Elements of A Language for Role-Based Access Control371
Disallowing Unauthorized State Changes of Distributed Shared Objects381
Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network391
On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations401
Information Warfare: Fact or Fiction?411
Enforcing Privacy by Withholding Private Information421
The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age431
A Framework for Electronic Commerce Security441
Electronic Payment Systems with Fair On-line Verification451
Fair Electronic Cash Systems with Multiple Banks461
Securing Mobile Agents for Electronic Commerce: an Experiment471
A Flexible Management Framework for Certificate Status Validation481
A Security Architecture for Electronic Commerce Applications491
On the Development of the Advanced Encryption Standard503
Public Key Infrastructure: Managing the e-Business Security505
Index of contributors507


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Information Security For Global Information Infrastructures, This book presents a state-of-the-art review of current  perspectives in information security, focusing on technical as well as  functional issues. It contains the selected proceedings of the  Sixteenth Annual Working Conference on Information Security (S, Information Security For Global Information Infrastructures

X
WonderClub Home

This item is in your Collection

Information Security For Global Information Infrastructures, This book presents a state-of-the-art review of current  perspectives in information security, focusing on technical as well as  functional issues. It contains the selected proceedings of the  Sixteenth Annual Working Conference on Information Security (S, Information Security For Global Information Infrastructures

Information Security For Global Information Infrastructures

X
WonderClub Home

This Item is in Your Inventory

Information Security For Global Information Infrastructures, This book presents a state-of-the-art review of current  perspectives in information security, focusing on technical as well as  functional issues. It contains the selected proceedings of the  Sixteenth Annual Working Conference on Information Security (S, Information Security For Global Information Infrastructures

Information Security For Global Information Infrastructures

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: