Information Security Management, Education and Privacy
Editat de Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wangen Limba Engleză Paperback – 30 mai 2013
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 622.11 lei 6-8 săpt. | |
| Springer – 30 mai 2013 | 622.11 lei 6-8 săpt. | |
| Hardback (1) | 627.66 lei 6-8 săpt. | |
| Springer Us – 27 iul 2004 | 627.66 lei 6-8 săpt. |
Preț: 622.11 lei
Preț vechi: 777.63 lei
-20%
Puncte Express: 933
Preț estimativ în valută:
110.02€ • 130.45$ • 95.79£
110.02€ • 130.45$ • 95.79£
Carte tipărită la comandă
Livrare economică 30 martie-13 aprilie
Specificații
ISBN-13: 9781475780147
ISBN-10: 1475780141
Pagini: 332
Ilustrații: XII, 313 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:Softcover reprint of the original 1st ed. 2004
Editura: Springer
Locul publicării:New York, NY, United States
ISBN-10: 1475780141
Pagini: 332
Ilustrații: XII, 313 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:Softcover reprint of the original 1st ed. 2004
Editura: Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Corporate Information Security Education.- Towards Corporate Information Security Obedience.- CIIP-RAM- A Security Risk Analysis Methodology for Critical Information Infrastructure Protection.- A Framework for Role-Based Monitoring of Insider Misuse.- Update/Patch Management Systems.- Investigating a Smart Technology.- Laboratory Support for Information Security Education.- An Holistic Approach to an International Doctoral Program.- A New Paradigm for Information Security Education at Doctoral Level.- Highly Qualified Information Security Personnel Training in Russia.- Doctor of Philosophy: It Security.- Doctoral Programme on ICS Security at the University of the Aegean.- An International Security Education Perspective.- DO Military Forces Need Ph.D.’s?.- A Doctoral Program with Specialization in Information Security.- A Security Model for Anonymous Credential Systems.- Private Information Storage with Logarithmic-Space Secure Hardware.- Taxonomy of Mixes and Dummy Traffic.- Identity Management for Self-Portrayal.- Privacy Preserving Online Reputation Systems.- A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications.- Privacy-Invasive Software in Filesharing Tools.- Infusing Privacy Norms in DRM.