Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark: IFIP Advances in Information and Communication Technology
Editat de Louise Yngström, Jan Carlsenen Limba Engleză Hardback – 31 mai 1997
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1287.58 lei 6-8 săpt. | |
Springer Us – 5 iun 2013 | 1287.58 lei 6-8 săpt. | |
Hardback (1) | 1278.08 lei 6-8 săpt. | |
Springer Us – 31 mai 1997 | 1278.08 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 337.82 lei
- Preț: 394.46 lei
- 20% Preț: 333.55 lei
- 20% Preț: 338.47 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 15% Preț: 703.62 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1278.74 lei
- 18% Preț: 1218.16 lei
- 20% Preț: 1272.54 lei
- 18% Preț: 1215.15 lei
- 18% Preț: 946.01 lei
- 18% Preț: 946.17 lei
- 18% Preț: 938.03 lei
- 18% Preț: 941.30 lei
- 15% Preț: 640.72 lei
- 18% Preț: 953.04 lei
- 20% Preț: 1278.59 lei
- 20% Preț: 991.33 lei
- 18% Preț: 942.24 lei
- 20% Preț: 1274.33 lei
- 20% Preț: 988.55 lei
- 15% Preț: 641.03 lei
- 20% Preț: 1267.30 lei
- 20% Preț: 1908.77 lei
- 20% Preț: 1276.46 lei
- 18% Preț: 949.62 lei
- 18% Preț: 939.75 lei
- 18% Preț: 1215.32 lei
- 20% Preț: 1268.45 lei
- 18% Preț: 946.01 lei
- 18% Preț: 940.99 lei
- 20% Preț: 1283.00 lei
- 18% Preț: 949.14 lei
- 20% Preț: 641.03 lei
- 18% Preț: 1226.14 lei
- 20% Preț: 1274.98 lei
- 18% Preț: 1221.92 lei
- 20% Preț: 985.77 lei
- 20% Preț: 1279.43 lei
- 20% Preț: 979.88 lei
- 18% Preț: 1819.79 lei
Preț: 1278.08 lei
Preț vechi: 1597.61 lei
-20% Nou
Puncte Express: 1917
Preț estimativ în valută:
244.78€ • 252.19$ • 205.05£
244.78€ • 252.19$ • 205.05£
Carte tipărită la comandă
Livrare economică 22 februarie-08 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780412817809
ISBN-10: 0412817802
Pagini: 472
Ilustrații: XII, 472 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.86 kg
Ediția:1997
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 0412817802
Pagini: 472
Ilustrații: XII, 472 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.86 kg
Ediția:1997
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1 Information security — challenges for the next millenium.- 2 Selection of secure single sign-on solutions for heterogeneous computing environments.- 3 A formal model to aid documenting and harmonizing of information security requirements.- 4 A compile-time model for safe information flow in object-oriented databases.- 5 Deriving Authorizations from Process Analysis in Legacy Information Systems.- 6 The Role of Government in Creating the IT Security Infrastructure: Builder or Bystander?.- 7 Code of Practice: A Standard for Information Security Management.- 8 Can security baselines replace risk analysis?.- 9 gGSS-API: a group enhanced generic security service.- 10 Electronic document exchange in Sweden — the legal aspects.- 11 An attack detection system for secure computer systems — outline of the solution.- 12 A taxonomy and overview of information security experiments.- 13 Pseudonymous audit for privacy enhanced intrusion detection.- 14 Individual management of personal reachability in mobile communication.- 15 New vistas on info-system security.- 16 A common criteria framework for the evaluation of information technology systems security.- 17 A methodology for accrediting a commercial distributed database.- 18 A comparison of schemes for certification authorities/trusted third parties.- 19 How to trust systems.- 20 Integrating information security in the development of telematics systems.- 21 Developing secure applications: a systematic approach.- 22 Controlling Internet access at an educational institution.- 23 Analysis of Java security and hostile applets.- 24 New organizational forms for information security management.- 25 Security when outsourcing: concepts, constructs, compliance.- 26 The IFIP TC11 position on cryptopolicies.- 27 Towards an holistic viewof enterprise ICT security and safety.- 28 A taxonomy of electronic cash schemes.- 29 Large scale elections by coordinating electoral colleges.- 30 MVS-SAT: a security administration tool to support SMF protocol data evaluation.- 31 security requirements and solutions in distributed electronic health records.- 32 ODESSA — a new approach to healthcare risk analysis.- 33 A comprehensive need-to-know access control system and its application for medical information systems.- 34 The future of networks and network security.- 35 Securing communications over ATM networks.- 36 Non-intrusive authentication.- 37 Roaming security agents enabling intelligent access control and network protection.- Index of contributors.- Keyword index.