Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990
著者
書誌事項
Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990
North-Holland , Distributors for the U.S. and Canada, Elsevier Science, 1991
大学図書館所蔵 件 / 全7件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references
内容説明・目次
内容説明
Computer security and information integrity are areas of vital importance whose real significance is only just being recognised. This book presents research into a range of topics, including management issues, viruses and corporate policy. All major aspects of the field are covered, with a strong emphasis on practical solutions.
目次
POS Security - State of Art in Finland (L. Arnkil, E. Einola). Portfolio Techniques to Support Risk Management and Security (K. Bauknecht, C. Strauss). Security - A Personnel Issue: The Importance of Personnel Attitudes and Security Education (J.G. Beatson). EDP Safety and Usage (I. Bentzien). A Knowedge Based Method of Managing Risks in Dynamic Environments (D. Bonyun, G. Jones). Risk Analysis of "Trusted Computer Systems" (K. Brunnstein, S. Fischer-Hubner). A Relational DBMS Security Policy (R.K. Burns). CRYPTEL: The Practical Protection of an Existing Electronic Mail System (H. Cnudde). Planning as a Means to Achieve Appropriate Data Communications Security (C. Cresson Wood). The Concept of Secure Information Processing Systems and Their Basic Functions (R. Dierstein). A Methodology for Analysing Human and Computer-Related Issues in Secure Systems (J. Dobson). Asymmetric Authentication Schemes for Smart Cards - Dream or Reality? (W. Fumy, A. Pfau). Contingency Planning - Managing the External Impacts of System Security Failures (R. Hackworth). Computer Viruses: Factors to Consider Before Purchasing an Anti-Virus Product (H.J. Highland). The Digital Distributed System Security Architecture (D.B. Holden). Computer Ethics and Computer Abuse: A Longitudinal Study of Swedish University Students (S. Kowalski). Managing the Virus Risk (M.P.J. Kratz, P.J. Johnston). Information Systems Auditing - A Support to Management (K.E. Kristiansen). Planning for Disaster Recovery in a Multi-Vendor, Networked Computing Environment (K.H. Krueger). Technical Criteria for Security Evaluation of IT Products (Y. Le Roux). Proactive Network Risk Management (J. Lobel). Data Privacy: Legislation and Intelligence Agency Threats (W. Madsen). Separation of Duties Audit Concerns and the Clark-Wilson Data Integrity Model (R.R. Moeller). Security in ODP Systems (S. Muftic). Auditing the SNA/SNI Environment (R. Paans, H. de Lange). Seventeen Information Security Myths Debunked (D.B. Parker). Modelling Security in Distributed Systems (H.P. Riess). Corporate Information Security Policy (B. Sarton, P. Capiteijns). Computer Assisted Investigation of Computer Crime (P.M. Stanley). Trouble Ahead: Information Crime and Jurisdiction (M. Tantam). Case Tools and Security: A Solution or a Problem? (L.T. Taylor).
「Nielsen BookData」 より