Sold Out
Book Categories |
1 | Security should pay: it should not cost | 3 |
2 | Improving the security of medical database systems | 11 |
3 | Security within financial information systems | 26 |
4 | Common criteria for IT security evaluation - update report | 41 |
5 | Information security accreditation - the ISO 9000 route | 50 |
6 | Encryption policy for the Global Information Infrastructure | 63 |
7 | An object-oriented approach to an IT risk management system | 79 |
8 | Systematic approach to security risk investigation | 87 |
9 | A holistic approach to IT security | 98 |
10 | Analysis of DES double key mode | 113 |
11 | Meta-multisignature schemes based on the discrete logarithm problem | 128 |
12 | Information security issues in mobile computing | 143 |
13 | A new framework for information security to avoid information anarchy | 155 |
14 | A practical conference key distribution system | 167 |
15 | A LAN voting protocol | 176 |
16 | Security in group applications: Lotus notes as case study | 190 |
17 | Auctioning by satellite using trusted third party security services | 205 |
18 | Experience in application of composable security properties | 223 |
19 | Matching security policies to application needs | 237 |
20 | A methodology for the development of secure application systems | 255 |
21 | A context authentication service for role based access control in distributed systems CARDS | 270 |
22 | Functional and operational security system for open distributed environments | 289 |
23 | Distributed object system security | 305 |
24 | Creating security applications based on the Global Certificate Management System | 322 |
25 | Extending distributed audit to heterogenous audit subsystems | 331 |
26 | Data protection communications and storage | 340 |
27 | Handling imprecise information in risk management | 357 |
28 | Achieving an integrated design: the way forward for information security | 369 |
29 | A day in the life of a Swedish IT Security Officer: an attempt at an empirical study | 384 |
30 | Security management in a distributed open environment | 396 |
31 | TeleSeC a solution to implementing digital signature in EDI/EDIFACT | 409 |
32 | On paradigms for security policies in multipolicy environments | 421 |
33 | Key management and the security of management in open systems: the SAMSON prototype | 436 |
34 | A classification of health information systems security flaws | 453 |
35 | Developing policies, procedures and information security systems | 465 |
36 | Aligning information security profiles with organizational policies | 477 |
37 | Viruses, corruption, denial, disruption and information assurance | 495 |
38 | A framework for access control models | 513 |
39 | LTTP protection - pragmatic approach to licensing | 534 |
40 | Detecting intrusions in smart card applications using expert systems and neural networks | 549 |
41 | Reinforcing password authentication with typing biometrics | 562 |
42 | Portrait of the computer criminal | 577 |
43 | Comprehensive Information Technology security: a new approach to respond to ethical and social issues surrounding information security in the 21st Century | 590 |
44 | Ethical information security in a cross-cultural environmental | 603 |
45 | From social requirements to technical solutions - bridging the gap with user-oriented data security | 612 |
Appendix A: Swedish Workshop: "Security on the electronic highways in Sweden" | 624 | |
Appendix B: Work Groups at IFIP/Sec '95 | 624 | |
Index of contributors | 625 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation Security - the Next Decade
X
This Item is in Your InventoryInformation Security - the Next Decade
X
You must be logged in to review the productsX
X
X
Add Information Security - the Next Decade, These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover, Information Security - the Next Decade to the inventory that you are selling on WonderClubX
X
Add Information Security - the Next Decade, These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented cover, Information Security - the Next Decade to your collection on WonderClub |