did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780792375067

Advances in Information Security Management and Small Systems Security : IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management and Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA

by ; ; ;
  • ISBN13:

    9780792375067

  • ISBN10:

    0792375068

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2001-08-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
List Price: $213.00 Save up to $159.34
  • Digital
    $116.27
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues. Topics in this volume include the latest developments in: Information security management issues; Network security and protocols; Information security aspects of E-commerce; Distributed computing and access control; Security in mobile environments; Advances in intrusion detection; Information Security Risk management. £/LIST£ This volume contains the selected proceedings of the Eighth Annual Working Conference on Information Security Management & Small Systems Security, which was sponsored by the International Federation for Information Processing (IFIP) and held in Las Vegas, USA in September 2001. Advances in Information Security Management & Small Systems Security will be essential reading for researchers in information systems, computer science, information technology, and business informatics, as well as to information security consultants, system analysts and engineers, and IT managers.

Table of Contents

Preface vii
Acknowledgements ix
Reviewers x
Reviewed papers
Web Assurance: Information Security Management for e-commerce
1(12)
Les Labuschagne
A Model and Implementation Guidelines for Information Security Strategies in Web Environments
13(22)
C. Margarits
N. Kolokotronis
P. Papadopoulou
P. Kanellis
D. Martakos
A Three-Dimensional Framework for Security Implementation in Mobile Environments
35(10)
Bethuel Roberto Vinaja
Maintaining Integrity within Mobile Self Protecting Objects
45(12)
Wesley Brandi
Martin Oliver
Building on Solid Foundations: An Information Security Case Study
57(16)
Edo Roos Lindgreen
Jaap Acohen
Hans De Boer
Gerrit Uit De Bosch
Cees Van Rinsum
Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in Spear II
73(14)
Elton Saul
Andrew Hutchison
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks
87(12)
S.M.Furnell
M.Papadaki
G.Magklaras
A.Alayed
A New Paradigm For Adding Security Into IS Development Methods
99(14)
Mikko Siponen
Richard Baskerville
Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module
113(14)
John Biggam
Alan Hogarth
Security Documentation
127(14)
Lam-For Kwok
Peggy PK Fung
Dennis Longley
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques
141(16)
Elme Smith
Jan H.P. Eloff
A Security Method for Healthcare Organisations
157(10)
Matthew Warren
William Hutchinson
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study
167(16)
Gurpreet Dhillon
Leiser Silva
Intrusion Detection Systems: Possibilities for the Future
183(14)
Karen A. Forcht
Christopher Allen
Barbara Brodman
David Corning
Jacob Kouns
Implementing Information Security Management Systems
197(16)
Fredrik Bjorck
Index of contributors 213

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program