Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Compsec 1994

Proceedings of the 11th World Conference on Computer Security, Audit and Control, London, October 12-14 1994
Buch | Softcover
480 Seiten
1994
Elsevier Advanced Technology (Verlag)
978-1-85617-243-1 (ISBN)
CHF 209,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This text presents the full proceedings of COMPSEC 1994 which acts as a forum providing solutions for current computer security problems.
The full proceedings from the premier intemational computer security event. Attracting renowned speakers from all over the world, COMPSEC International remains established as the leading international forum providing solutions for today's computer security problems. AUDIENCE For all those interested in computer security.

Keynote. 1994 security breaches survey (C. Hook). Management Issues. Making security pay (M. Smith). Duress terminations and information security (C. Cresson Wood ). Understanding backups: a business perspective (J. Maynard). A benchmarking approach to user security (D. Davies). The Virus Threat. Virus control on networks: solving the insoluble (J. Hruska). Cost effectiveness of anti-viral software (B. Zajac ). Telecommunications. Computer related offenses in a telecommunications environment (T Mulhall). Financial Systems. EDI security (T. Dosdale). Evaluations for financial security systems (E. Bovelander ). Legislation / Standards. A critique of security standards (T Lilleywhite). European IT security legislation (J. Worthy). Network Security. Secure connections to the Internet (B. Neal). 50 ways to secure dial-up connections (C. Cresson Wood). Comprehensive LAN security with minimum effort (P Wood). Use of network design to reduce security risks (L. Hansen). New Technology. Where biometrics are today? (B. Carter). Trends & directions in smart card security (N. McEvoy). Encryption. Crypto security tools and algorithms (C. Meyer). Digital signatures and their uses (M. Ganley). Disaster Recovery. Countering the bomb threat (R. Incenance). The emergency help desk (B. Doswell). Directors Briefing - Profit Multipliers / Profit Reducers. The real cost of IT (J. Edler). Open Systems Security. Security in the client / server environment (J. Sherwood). Database security (D. Harris, D. Sidwell). Systems / Application Specific. Lotus notes security, a contradiction in terms (K. Lindup). An introduction to MVS integrity concerns (N. Crocker ). Open VMS security (T. Pitt). Industrial Espionage. Online industrial espionage (W. Madsen). Industrial espionage: analysing the risk (P. Sommer). Hacking. Hacking: tricks of the trade (R. Schifreen ). The cyperpunk age (K. Lindup). Audit Stream. Auditing, IT effectiveness (P Williams ). Auditing the procurement of end user computing resources (S. Blackburn). PC's as a power tool for efficiency (M. Wotton ). Security in distributed & client server systems - a management view (I. Symonds). (Part contents)

Erscheint lt. Verlag 19.10.1994
Zusatzinfo Illustrations
Verlagsort Oxford
Sprache englisch
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 1-85617-243-0 / 1856172430
ISBN-13 978-1-85617-243-1 / 9781856172431
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich