Information Security for Global Information Infrastructures
Editat de Sihan Qing, Jan H. P. Eloffen Limba Engleză Hardback – 31 iul 2000
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 1233.02 lei 6-8 săpt. | |
| Springer Us – 6 feb 2013 | 1233.02 lei 6-8 săpt. | |
| Hardback (1) | 1240.75 lei 6-8 săpt. | |
| Springer – 31 iul 2000 | 1240.75 lei 6-8 săpt. |
Preț: 1240.75 lei
Preț vechi: 1550.94 lei
-20% Nou
Puncte Express: 1861
Preț estimativ în valută:
219.56€ • 256.05$ • 192.78£
219.56€ • 256.05$ • 192.78£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780792379140
ISBN-10: 0792379144
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 160 x 241 x 33 mm
Greutate: 0.95 kg
Ediția:2000
Editura: Springer
Locul publicării:New York, NY, United States
ISBN-10: 0792379144
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 160 x 241 x 33 mm
Greutate: 0.95 kg
Ediția:2000
Editura: Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. IT Security Certification and Criteria.- 2. Information Security: Process Evaluation and Product Evaluation.- 3. Managing Information Security in Healthcare — an Action Research Experience.- 4. From Trusted Information Security Controls to a Trusted Information Security Environment.- 5. A Qualitative Approach to Information Availability.- 6. A Postgraduate Programme on Information and Communication Systems Security.- 7. Information Security Management through Measurement.- 8. The Defense Framework for Large-scale Computer Network System.- 9. Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.- 10. Independent Policy Oriented Layering of Security Services.- 11. Reducing Computer Fraud through Situational Crime Prevention.- 12. Policies for Construction of Information Systems’ Security Guidelines: Five Approaches.- 13. ‘DNA-proofing’ for Computer Systems — A New Approach to Computer Security?.- 14. Using Smart Cards in an Educational Environment: Services and Security Features.- 15. MASS: Model for an Auditing Security System.- 16. Classifying Information for External Release.- 17. Using Mobile Agent Results to Create Hard-To-Detect Computer Viruses.- 18. CARDS: A Distributed System for Detecting Coordinated Attacks.- 19. Robust Audio Watermarking based on Secure Spread Spectrum and Auditory Perception Model.- 20. A Simple and Efficient Approach to Verifying Cryptographic Protocols.- 21. Power Analysis of RC6 and Serpent.- 22. A Simple Algorithm for Computing Several Sequences Synthesis.- 23. GSFS — A New Group-Aware Cryptographic File System.- 24. Robustness-Agile Encryptor for ATM Networks.- 25. Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.- 26. A New Serial/Parallel Architecture for a LowPower Modular Multiplier.- 27. Defending Against Null Calls Stream Attacks by Using a Double- Threshold Dynamic Filter.- 28. A Multi-party Non-repudiation Protocol.- 29. Analysis and Design of E-voting Protocol.- 30. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents’ Community.- 31. Towards Network Denial of Service Resistant Protocols.- 32. A Generic Graphical Specification Environment for Security Protocol Modelling.- 33. Anonymous Electronic Voting System with Non-Transferable Voting Passes.- 34. Improving Packet Filters Management through Automatic and Dynamic Schemes.- 35. A Context-Sensitive Access Control Model and Prototype Implementation.- 36. Regulating Access to Semistructured Information on the Web.- 37. On the Practical Feasibility of Secure Distributed Computing: A Case Study.- 38. Elements of A Language for Role-Based Access Control.- 39. Disallowing Unauthorized State Changes of Distributed Shared Objects.- 40. Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network.- 41. On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Nondescriptive Foundations.- 42. Information Warfare: Fact or Fiction?.- 43. Enforcing Privacy by Withholding Private Information.- 44. The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age.- 45. A Framework for Electronic Commerce Security.- 46. Electronic Payment Systems with Fair On-line Verification.- 47. Fair Electronic Cash Systems with Multiple Banks.- 48. Securing Mobile Agents for Electronic Commerce: an Experiment.- 49. A Flexible Management Framework for Certificate Status Validation.- 50. A Security Architecture for Electronic CommerceApplications.- 51. On the Development of the Advanced Encryption Standard.- 52. Public Key Infrastructure: Managing the e-Business Security.- Index of contributors.