did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780792386261

Information Security Management & Small Systems Security

by ; ; ;
  • ISBN13:

    9780792386261

  • ISBN10:

    0792386264

  • Format: Hardcover
  • Copyright: 1999-09-01
  • Publisher: Kluwer Academic Pub

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $219.99 Save up to $166.33
  • Buy Used
    $164.99
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book presents a state-of-the-art review of current perspectives in information security management and small systems security, focusing on technical and functional as well as managerial issues. It contains the selected proceedings of the Seventh Annual Working Conference on Information Security Management and Small Systems Security, sponsored by the International Federation for Information Processing (IFIP) and held in Amsterdam, The Netherlands, in September/October 1999. Topics in this volume include the latest developments in: Secure techniques for smart card technology; Information security management issues; Risk analysis; Intranets; Electronic commerce protocols; Certification and accreditation; Biometrics authentication. A/LISTA This volume will be essential reading for researchers in computer science, information technology, and business informatics, as well as for information security consultants, systems analysts and engineers, and IT managers.

Table of Contents

Preface vii
Acknowledgements ix
Part One - Reviewed papers
A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards
1(10)
Rudiger Weis
Real-time Risk Analysis on the Internet: a prototype
11(18)
H. S. Venter
L. Labuschagne
J.H.P. Eloff
A practical approach to manage data communication security
29(12)
P. H Samwel
Marcel Spruit
The Future of Australian & New Zealand Security Standard AS/NZS 4444?
41(10)
Matthew Warren
Bill Hutchinson
The Effective Utilization of Audit Logs in Information Security Management
51(12)
Werner Olivier
Rossouw Von Solms
An approach to standardizing security analysis methods for virtual systems
63(12)
Ann Frisinger
Louise Yngstrom
Information Security at Top Level-Securometer® streamlines management information
75(14)
Andre Buren
Bert Van Der Meer
Abbas Shahim
Willem Barnhoorn
Edo Roos Lindgreen
Risk analysis on Internet connection
89(14)
Marcel Spruit
P. H Samwel
A Secure Station for Network Monitoring and Control
103(14)
Vassilis Prevelakis
Security aspects of a Java-servlet-based web-hosted e-mail system
117(14)
Eleanor Hepworth
Ulrich Ultes-Nitsche
Time as an Aid to Improving Security in Smart Cards
131(14)
Vincent Cordonnier
Anthony Watson
Sergiy Nemchenko
The Intranet Authorization Paradigm
145(16)
Mark Vandenwauver
Paul Ashley
Gary Gaskell
Predicting the Performance of Transactional Electronic Commerce Protocols
161(18)
Matthew Berry
Andrew Hutchison
Elton Saul
Part Two - Invited papers
The Cyber-Posture of the National Information Infrastructure
179(26)
Willis H. Ware
Principles of Iris Recognition
205(8)
Michael Negin
Machiel Van Der Harst
Designing a Secure System for Implementing Chip Cards in the Financial Services Industry
213(8)
Terry Stanley
New models for the management of public key infrastructure and root certification authorities
221(10)
Stephen Wilson
A Secure Electronic Commerce Environment: Only with ``Smart Cards''
231(12)
William Caelli
Index of contributors 243

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program