Sold Out
Sold Out
Book Categories |
Executive Summary | 1 | |
1 | Introduction | 12 |
2 | Public Telephone Network and Internet Trustworthiness | 26 |
3 | Software for Networked Information Systems | 62 |
4 | Reinventing Security | 109 |
5 | Trustworthy Systems from Untrustworthy Components | 154 |
6 | The Economic and Public Policy Context | 171 |
7 | Conclusions and Research Recommendations | 240 |
App. A | Study Committee Biographies | 259 |
App. B | Briefers to the Committee | 267 |
App. C | Workshop Participants and Agendas | 269 |
App. D | List of Position Papers Prepared for the Workshops | 279 |
App. E | Trends in Software | 281 |
App. F | Some Related Trustworthiness Studies | 285 |
App. G | Some Operating System Security Examples | 291 |
App. H | Types of Firewalls | 293 |
App. I | Secrecy of Design | 296 |
App. J | Research in Information System Security and Survivability Funded by the NSA and DARPA | 298 |
App. K: Glossary | 300 | |
Index | 319 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionTrust in cyberspace
X
This Item is in Your InventoryTrust in cyberspace
X
You must be logged in to review the productsX
X
X
Add Trust in cyberspace, This book provides an assessment of the current state of the art for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, it as, Trust in cyberspace to the inventory that you are selling on WonderClubX
X
Add Trust in cyberspace, This book provides an assessment of the current state of the art for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, it as, Trust in cyberspace to your collection on WonderClub |