Error title
Some error text about your books and stuff.
Close

Security in the Information Society Visions and Perspectives

by Mahmoud T. El-Hadidi

  • ISBN: 9781402070303
  • ISBN10: 1402070306

Security in the Information Society Visions and Perspectives

by Mahmoud T. El-Hadidi

  • List Price: $237.00
  • Binding: Hardcover
  • Publisher: Kluwer Academic Pub
  • Publish date: 04/01/2002
  • ISBN: 9781402070303
  • ISBN10: 1402070306
new Add to Cart $158.15
You save: 33%
FREE economy shipping!
Description: One Information Security Management.- 1. The Effective Implementation of Information Security in Organizations.- 2. A Practical Approach to Information Security Awareness in the Organization.- 3. RBAC Policies in XML for X.509 Based Privilege Management.- 4. A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration.- 5. Elaborating Quantitative Approaches for IT Security Evaluation.- Two Standards of Information Security.- 6. A Security Evaluation Criteria for Baseline Security Standards.- 7. Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects.- 8. For a Secure Mobile IP and Mobile IPv6 Deployment.- Three Threats and Attacks to Information.- 9. Addressing Internet Security Vulnerabilities: A Benchmarking Study.- 10. The Threat From Within -- An Analysis of Attacks on an Internal Network.- 11. Security Vulnerabilities in Event-Driven Systems.- 12. Denial of Service: Another Example.- 13. A Detection Scheme for the SK Virus.- Four Education and Curriculum for Information Security.- 14. An Information Security Curriculum in Finland.- Five Social and Ethical Aspects of Information Security.- 15. Information Security Culture: The Socio-Cultural Dimension in Information Security Management.- 16. Information Security Culture.- Six Information Security Services.- 17. Keystroke Analysis as a Method of Advanced User Authentication and Response.- 18. Zero Knowledge Broadcasting Identification Scheme.- 19. A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services.- 20. Mandatory Security Policies for CORBA Security Model.- 21. Policap-Proposal, Development and Evaluation of a Policy Service and Capabilities for CORBA Security.- 22. Secure Database Connectivity on the WWW.- 23.Towards Semantic Integrity in Rational Database.- 24. Formal Design of Packet Filtering Systems.- 25. Elliptic Curve Cryptosystems on Smart Cards.- Seven Multilateral Security.- 26. Establishing Bilateral Anonymous Communication in Open Networks.- Eight Applications of Information Security.- 27. BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business.- 28. Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration.- 29. An Efficient Hybrid Sealed Bid Auction Protocol.- 30. Self-Determination in Mobile Internet: PiMI Prototype Results.- 31. Secure Component Distribution Using WebCom.- 32. E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals.- 33. An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions.- Nine Infrastructure for Information Security.- 34. Secure Selective Exclusion in Ad Hoc Wireless Network.- Ten Advanced Topics in Security.- 35. Optical Network Models for Quantum Cryptography.- Eleven Legislation for Information Security.- 36. A Unified Regulatory Framework on a European Information Society: Suggested Building Levels.- 37. Revisiting Legal and Regulatory Requirements for Secure E-Voting.- Twelve Modeling and Analysis for Information Security.- 38. A Security Incident Data Model.- 39. Security Levels for Contracting Agents.- 40. Functional Requirements for a Secure Electronic Voting System.- 41. Intelligent IP Packet Filtering.- Thirteen Tools for Information Security.- 42. Human Computer Interaction: An Information Security Perspectives.- 43. A Very Smart Card for Fighting Against Terrorism.- 44. SHEDEL -- A Simple Hierarchical Event Description Language for Specifying Attack Signatures.- 45. PropagatingModifications to Mobile Policies.- Author Index.
Expand description
please wait
Please Wait

Notify Me When Available

Enter your email address below,
and we'll contact you when your school adds course materials for
.
Enter your email address below, and we'll contact you when is back in stock (ISBN: ).