Security in the Information Society: Visions and Perspectives: IFIP Advances in Information and Communication Technology, cartea 86
Editat de M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslanen Limba Engleză Paperback – 12 dec 2012
Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics:
- Information Security Management;
- Standards of Information Security;
- Threats and Attacks to Information;
- Education and Curriculum for Information Security;
- Social and Ethical Aspects of Information Security;
- Information Security Services;
- Multilateral Security;
- Applications of Information Security;
- Infrastructure for Information Security
- Advanced Topics in Security;
- Legislation for Information Security;
- Modeling and Analysis for Information Security;
- Tools for Information Security.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 908.16 lei 6-8 săpt. | |
Springer Us – 12 dec 2012 | 908.16 lei 6-8 săpt. | |
Hardback (1) | 911.16 lei 6-8 săpt. | |
Springer Us – 30 apr 2002 | 911.16 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 322.44 lei
- Preț: 376.53 lei
- 20% Preț: 318.38 lei
- 20% Preț: 323.07 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 1162.12 lei
- 18% Preț: 1162.27 lei
- 20% Preț: 1220.04 lei
- 20% Preț: 1214.12 lei
- 18% Preț: 1159.39 lei
- 18% Preț: 902.62 lei
- 18% Preț: 902.79 lei
- 18% Preț: 895.02 lei
- 18% Preț: 898.15 lei
- 15% Preț: 611.40 lei
- 18% Preț: 909.34 lei
- 20% Preț: 1219.90 lei
- 20% Preț: 945.86 lei
- 18% Preț: 899.03 lei
- 20% Preț: 1215.84 lei
- 20% Preț: 943.22 lei
- 15% Preț: 611.72 lei
- 20% Preț: 1209.12 lei
- 20% Preț: 1821.05 lei
- 20% Preț: 1217.86 lei
- 18% Preț: 906.09 lei
- 18% Preț: 896.67 lei
- 18% Preț: 1159.56 lei
- 20% Preț: 1210.22 lei
- 18% Preț: 902.62 lei
- 18% Preț: 897.86 lei
- 20% Preț: 1224.11 lei
- 18% Preț: 905.63 lei
- 20% Preț: 611.70 lei
- 18% Preț: 1169.87 lei
- 20% Preț: 1216.46 lei
- 20% Preț: 940.57 lei
- 18% Preț: 1165.84 lei
- 20% Preț: 1220.69 lei
- 20% Preț: 934.94 lei
- 18% Preț: 1736.16 lei
- 20% Preț: 1223.79 lei
- 18% Preț: 905.32 lei
- 20% Preț: 1218.01 lei
Preț: 908.16 lei
Preț vechi: 1107.51 lei
-18% Nou
Puncte Express: 1362
Preț estimativ în valută:
173.92€ • 188.21$ • 144.98£
173.92€ • 188.21$ • 144.98£
Carte tipărită la comandă
Livrare economică 09-23 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475710267
ISBN-10: 1475710267
Pagini: 600
Ilustrații: XII, 586 p.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.83 kg
Ediția:2002
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1475710267
Pagini: 600
Ilustrații: XII, 586 p.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.83 kg
Ediția:2002
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
One Information Security Management.- 1. The Effective Implementation of Information Security in Organizations.- 2. A Practical Approach to Information Security Awareness in the Organization.- 3. RBAC Policies in XML for X.509 Based Privilege Management.- 4. A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration.- 5. Elaborating Quantitative Approaches for IT Security Evaluation.- Two Standards of Information Security.- 6. A Security Evaluation Criteria for Baseline Security Standards.- 7. Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects.- 8. For a Secure Mobile IP and Mobile IPv6 Deployment.- Three Threats and Attacks to Information.- 9. Addressing Internet Security Vulnerabilities: A Benchmarking Study.- 10. The Threat From Within — An Analysis of Attacks on an Internal Network.- 11. Security Vulnerabilities in Event-Driven Systems.- 12. Denial of Service: Another Example.- 13. A Detection Scheme for the SK Virus.- Four Education and Curriculum for Information Security.- 14. An Information Security Curriculum in Finland.- Five Social and Ethical Aspects of Information Security.- 15. Information Security Culture: The Socio-Cultural Dimension in Information Security Management.- 16. Information Security Culture.- Six Information Security Services.- 17. Keystroke Analysis as a Method of Advanced User Authentication and Response.- 18. Zero Knowledge Broadcasting Identification Scheme.- 19. A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services.- 20. Mandatory Security Policies for CORBA Security Model.- 21. Policap-Proposal, Development and Evaluation of a Policy Service and Capabilities for CORBA Security.- 22. Secure Database Connectivity on the WWW.- 23.Towards Semantic Integrity in Rational Database.- 24. Formal Design of Packet Filtering Systems.- 25. Elliptic Curve Cryptosystems on Smart Cards.- Seven Multilateral Security.- 26. Establishing Bilateral Anonymous Communication in Open Networks.- Eight Applications of Information Security.- 27. BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business.- 28. Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration.- 29. An Efficient Hybrid Sealed Bid Auction Protocol.- 30. Self-Determination in Mobile Internet: PiMI Prototype Results.- 31. Secure Component Distribution Using WebCom.- 32. E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals.- 33. An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions.- Nine Infrastructure for Information Security.- 34. Secure Selective Exclusion in Ad Hoc Wireless Network.- Ten Advanced Topics in Security.- 35. Optical Network Models for Quantum Cryptography.- Eleven Legislation for Information Security.- 36. A Unified Regulatory Framework on a European Information Society: Suggested Building Levels.- 37. Revisiting Legal and Regulatory Requirements for Secure E-Voting.- Twelve Modeling and Analysis for Information Security.- 38. A Security Incident Data Model.- 39. Security Levels for Contracting Agents.- 40. Functional Requirements for a Secure Electronic Voting System.- 41. Intelligent IP Packet Filtering.- Thirteen Tools for Information Security.- 42. Human Computer Interaction: An Information Security Perspectives.- 43. A Very Smart Card for Fighting Against Terrorism.- 44. SHEDEL — A Simple Hierarchical Event Description Language for Specifying Attack Signatures.- 45. PropagatingModifications to Mobile Policies.- Author Index.