Wonder Club world wonders pyramid logo
×

Information Security - the Next Decade Book

Information Security - the Next Decade
Information Security - the Next Decade, These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover, Information Security - the Next Decade has a rating of 2.5 stars
   2 Ratings
X
Information Security - the Next Decade, These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover, Information Security - the Next Decade
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $326.40
Original Magazine
Physical Format

Sold Out

  • Information Security - the Next Decade
  • Written by author Jan H.P. Eloff
  • Published by Springer-Verlag New York, LLC, December 2009
  • These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover
  • These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover
Buy Digital  USD$326.40

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

1Security should pay: it should not cost3
2Improving the security of medical database systems11
3Security within financial information systems26
4Common criteria for IT security evaluation - update report41
5Information security accreditation - the ISO 9000 route50
6Encryption policy for the Global Information Infrastructure63
7An object-oriented approach to an IT risk management system79
8Systematic approach to security risk investigation87
9A holistic approach to IT security98
10Analysis of DES double key mode113
11Meta-multisignature schemes based on the discrete logarithm problem128
12Information security issues in mobile computing143
13A new framework for information security to avoid information anarchy155
14A practical conference key distribution system167
15A LAN voting protocol176
16Security in group applications: Lotus notes as case study190
17Auctioning by satellite using trusted third party security services205
18Experience in application of composable security properties223
19Matching security policies to application needs237
20A methodology for the development of secure application systems255
21A context authentication service for role based access control in distributed systems CARDS270
22Functional and operational security system for open distributed environments289
23Distributed object system security305
24Creating security applications based on the Global Certificate Management System322
25Extending distributed audit to heterogenous audit subsystems331
26Data protection communications and storage340
27Handling imprecise information in risk management357
28Achieving an integrated design: the way forward for information security369
29A day in the life of a Swedish IT Security Officer: an attempt at an empirical study384
30Security management in a distributed open environment396
31TeleSeC a solution to implementing digital signature in EDI/EDIFACT409
32On paradigms for security policies in multipolicy environments421
33Key management and the security of management in open systems: the SAMSON prototype436
34A classification of health information systems security flaws453
35Developing policies, procedures and information security systems465
36Aligning information security profiles with organizational policies477
37Viruses, corruption, denial, disruption and information assurance495
38A framework for access control models513
39LTTP protection - pragmatic approach to licensing534
40Detecting intrusions in smart card applications using expert systems and neural networks549
41Reinforcing password authentication with typing biometrics562
42Portrait of the computer criminal577
43Comprehensive Information Technology security: a new approach to respond to ethical and social issues surrounding information security in the 21st Century590
44Ethical information security in a cross-cultural environmental603
45From social requirements to technical solutions - bridging the gap with user-oriented data security612
Appendix A: Swedish Workshop: "Security on the electronic highways in Sweden"624
Appendix B: Work Groups at IFIP/Sec '95624
Index of contributors625


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Information Security - the Next Decade, These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover, Information Security - the Next Decade

X
WonderClub Home

This item is in your Collection

Information Security - the Next Decade, These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover, Information Security - the Next Decade

Information Security - the Next Decade

X
WonderClub Home

This Item is in Your Inventory

Information Security - the Next Decade, These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover, Information Security - the Next Decade

Information Security - the Next Decade

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: