Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Computer Security

E.G. Dougall (Herausgeber)

Buch | Softcover
428 Seiten
1993
North-Holland (Verlag)
978-0-444-81748-8 (ISBN)
CHF 189,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Explores the evolution of computer security, as well as future developments anticipated in the field. Topics covered include the relationship between international standards and organizational security in both large and small systems.
This publication explores not only the evolution of computer security but future developments anticipated in the field. Many aspects of this increasingly significant area are considered, including the relationship between international standards and organizational security in both small and large systems. The importance of constantly improving and updating training and education is also discussed. Contributions are sourced from a broad base of world-renowned specialists and the book will therefore be of prime interest to researchers, developers and managers in the academic and industrial spheres alike.

Kristian Beckman Award Address: A View of Information Security Tomorrow. (H.J. Highland). Opening Keynote Address: The Evolution of IT Security Convergence. (P.R. Gallagher, Jr.). Teaching security basics: the importance of when and how (V. Fåk, A. Hunstad). The MSc in information security at Royal Holloway (D. Gollmann). Information security in the small systems context: a framework for understanding (G.G. Gable, H.J. Highland). Developing awareness, training and education: a cost effective tool for maintaining system integrity (C.D. Schou, W.V. Maconachy, J. Frost). Teaching computer security (M. Bishop). The filter model of information security: a conceptual model for education and training (A.R. Smith). Shamir's scheme says it all (E. Dawson, D. Donovan). LUC: A new public key system (P.J. Smith, M.J.J. Lennon). The encapsulated security services interface (ESSI) (P. Lin). Context-dependent access control in distributed systems (H. Strack, K.-Y. Lam). Internal control by objectives: the functional control matrix (K.H. Krueger). International standards and organizational security needs: bridging the gap (C.J. Bosch, J.H.P. Eloff, J.M. Carroll). The risk data repository: a novel approach to security risk modelling (A.M. Anderson, D. Longley, A.B. Tickle). Turning multiple evaluated products into trusted systems with assurance (D. Gambel, J. Fowler). Historical labels in open distribued IT systems: an ITSEC/ECMA specification (S. Kowalski). A model for organising information security documentation (L.M. du Toit, S.H. von Solms). Planning for the EDI of tomorrow using electronic document authorization (S. Russell). The EDP auditor: disappearing or adapting (G.G. Gable, G.B. Davis). Electronic Data Interface (EDI) security and audit: a practical approach (I. Ekebrink). A generic security platform for workstations (B. Lindberg). Evaluation of an academic programme in IT security 1985-1990 (L. Yngström). Fighting the viruses: practical anti-virus training (M. Larsson). A quantitative accreditation model - assessing the value of assurance (M. Ohlin). Superseding manual generation of access control specification - from policies to profiles (D. Pottas, S.H. von Solms). Extending the ISO access framework for multiple policies (M.D. Abrams, M.V. Joyce). Evolution of IT security in India - implementation issues (K. Subramanian). Legal response to a computer crime - retrospect of a mere chance case (J. Saari). Information systems security and fraud prevention in office automation systems (P.M. Stanley). A process approach to information security management (R. von Solms, S.H. von Solms, J.M. Carroll). MRA: a computational technique for security in high-performance systems (M. Abdelguerfi, A. Dunham, W. Patterson).

Erscheint lt. Verlag 25.11.1993
Reihe/Serie IFIP Transactions A: Computer Science and Technology
Zusatzinfo Illustrations
Sprache englisch
Themenwelt Informatik Theorie / Studium Kryptologie
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
ISBN-10 0-444-81748-4 / 0444817484
ISBN-13 978-0-444-81748-8 / 9780444817488
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich