Buch, Englisch, Band 26, 248 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1200 g
Reihe: IFIP Advances in Information and Communication Technology
Information Security Management & Small Systems Security
1999
ISBN: 978-0-7923-8626-1
Verlag: Springer US
IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30-October 1, 1999, Amsterdam, The Netherlands
Buch, Englisch, Band 26, 248 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1200 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-0-7923-8626-1
Verlag: Springer US
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Wirtschaftswissenschaften Literatur für Manager
- Wirtschaftswissenschaften Betriebswirtschaft Management
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware SAP
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
Weitere Infos & Material
one — Reviewed papers.- 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards.- 2. Real-time Risk Analysis on the Internet: a prototype.- 3. A practical approach to manage data communication security.- 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444?.- 5. The Effective Utilization of Audit Logs in Information Security Management.- 6. An approach to standardizing security analysis methods for virtual systems.- 7. Information Security at Top Level — Securometer® streamlines management information.- 8. Risk analysis on Internet connection.- 9. A Secure Station for Network Monitoring and Control.- 10. Security aspects of a Java-servlet-based web-hosted e-mail system.- 11. Time as an Aid to Improving Security in Smart Cards.- 12. The Intranet Authorization Paradigm.- 13. Predicting the Performance of Transactional Electronic Commerce Protocols.- two — Invited papers.- 14. The Cyber-Posture of the National Information Infrastructure.- 15. Principles of Iris Recognition.- 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry.- 17. New models for the management of public key infrastructure and root certification authorities.- 18. A Secure Electronic Commerce Environment: Only with “Smart Cards”.- Index of contributors.