Compsec 1994
Elsevier Advanced Technology (Verlag)
978-1-85617-243-1 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
The full proceedings from the premier intemational computer security event. Attracting renowned speakers from all over the world, COMPSEC International remains established as the leading international forum providing solutions for today's computer security problems. AUDIENCE For all those interested in computer security.
Keynote. 1994 security breaches survey (C. Hook). Management Issues. Making security pay (M. Smith). Duress terminations and information security (C. Cresson Wood ). Understanding backups: a business perspective (J. Maynard). A benchmarking approach to user security (D. Davies). The Virus Threat. Virus control on networks: solving the insoluble (J. Hruska). Cost effectiveness of anti-viral software (B. Zajac ). Telecommunications. Computer related offenses in a telecommunications environment (T Mulhall). Financial Systems. EDI security (T. Dosdale). Evaluations for financial security systems (E. Bovelander ). Legislation / Standards. A critique of security standards (T Lilleywhite). European IT security legislation (J. Worthy). Network Security. Secure connections to the Internet (B. Neal). 50 ways to secure dial-up connections (C. Cresson Wood). Comprehensive LAN security with minimum effort (P Wood). Use of network design to reduce security risks (L. Hansen). New Technology. Where biometrics are today? (B. Carter). Trends & directions in smart card security (N. McEvoy). Encryption. Crypto security tools and algorithms (C. Meyer). Digital signatures and their uses (M. Ganley). Disaster Recovery. Countering the bomb threat (R. Incenance). The emergency help desk (B. Doswell). Directors Briefing - Profit Multipliers / Profit Reducers. The real cost of IT (J. Edler). Open Systems Security. Security in the client / server environment (J. Sherwood). Database security (D. Harris, D. Sidwell). Systems / Application Specific. Lotus notes security, a contradiction in terms (K. Lindup). An introduction to MVS integrity concerns (N. Crocker ). Open VMS security (T. Pitt). Industrial Espionage. Online industrial espionage (W. Madsen). Industrial espionage: analysing the risk (P. Sommer). Hacking. Hacking: tricks of the trade (R. Schifreen ). The cyperpunk age (K. Lindup). Audit Stream. Auditing, IT effectiveness (P Williams ). Auditing the procurement of end user computing resources (S. Blackburn). PC's as a power tool for efficiency (M. Wotton ). Security in distributed & client server systems - a management view (I. Symonds). (Part contents)
Erscheint lt. Verlag | 19.10.1994 |
---|---|
Zusatzinfo | Illustrations |
Verlagsort | Oxford |
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 1-85617-243-0 / 1856172430 |
ISBN-13 | 978-1-85617-243-1 / 9781856172431 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich