Information Security Management & Small Systems Security
Editat de Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschurenen Limba Engleză Hardback – 30 sep 1999
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 906.17 lei 6-8 săpt. | |
| Springer Us – 21 mar 2013 | 906.17 lei 6-8 săpt. | |
| Hardback (1) | 953.60 lei 6-8 săpt. | |
| Springer – 30 sep 1999 | 953.60 lei 6-8 săpt. |
Preț: 953.60 lei
Preț vechi: 1192.00 lei
-20% Nou
Puncte Express: 1430
Preț estimativ în valută:
168.75€ • 196.79$ • 148.16£
168.75€ • 196.79$ • 148.16£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780792386261
ISBN-10: 0792386264
Pagini: 260
Ilustrații: XVI, 248 p.
Dimensiuni: 160 x 241 x 19 mm
Greutate: 0.56 kg
Ediția:1999
Editura: Springer
Locul publicării:New York, NY, United States
ISBN-10: 0792386264
Pagini: 260
Ilustrații: XVI, 248 p.
Dimensiuni: 160 x 241 x 19 mm
Greutate: 0.56 kg
Ediția:1999
Editura: Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
one — Reviewed papers.- 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards.- 2. Real-time Risk Analysis on the Internet: a prototype.- 3. A practical approach to manage data communication security.- 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444?.- 5. The Effective Utilization of Audit Logs in Information Security Management.- 6. An approach to standardizing security analysis methods for virtual systems.- 7. Information Security at Top Level — Securometer® streamlines management information.- 8. Risk analysis on Internet connection.- 9. A Secure Station for Network Monitoring and Control.- 10. Security aspects of a Java-servlet-based web-hosted e-mail system.- 11. Time as an Aid to Improving Security in Smart Cards.- 12. The Intranet Authorization Paradigm.- 13. Predicting the Performance of Transactional Electronic Commerce Protocols.- two — Invited papers.- 14. The Cyber-Posture of the National Information Infrastructure.- 15. Principles of Iris Recognition.- 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry.- 17. New models for the management of public key infrastructure and root certification authorities.- 18. A Secure Electronic Commerce Environment: Only with “Smart Cards”.- Index of contributors.