Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990
Author(s)
Bibliographic Information
Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990
North-Holland , Distributors for the U.S. and Canada, Elsevier Science, 1991
Available at 7 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references
Description and Table of Contents
Description
Computer security and information integrity are areas of vital importance whose real significance is only just being recognised. This book presents research into a range of topics, including management issues, viruses and corporate policy. All major aspects of the field are covered, with a strong emphasis on practical solutions.
Table of Contents
POS Security - State of Art in Finland (L. Arnkil, E. Einola). Portfolio Techniques to Support Risk Management and Security (K. Bauknecht, C. Strauss). Security - A Personnel Issue: The Importance of Personnel Attitudes and Security Education (J.G. Beatson). EDP Safety and Usage (I. Bentzien). A Knowedge Based Method of Managing Risks in Dynamic Environments (D. Bonyun, G. Jones). Risk Analysis of "Trusted Computer Systems" (K. Brunnstein, S. Fischer-Hubner). A Relational DBMS Security Policy (R.K. Burns). CRYPTEL: The Practical Protection of an Existing Electronic Mail System (H. Cnudde). Planning as a Means to Achieve Appropriate Data Communications Security (C. Cresson Wood). The Concept of Secure Information Processing Systems and Their Basic Functions (R. Dierstein). A Methodology for Analysing Human and Computer-Related Issues in Secure Systems (J. Dobson). Asymmetric Authentication Schemes for Smart Cards - Dream or Reality? (W. Fumy, A. Pfau). Contingency Planning - Managing the External Impacts of System Security Failures (R. Hackworth). Computer Viruses: Factors to Consider Before Purchasing an Anti-Virus Product (H.J. Highland). The Digital Distributed System Security Architecture (D.B. Holden). Computer Ethics and Computer Abuse: A Longitudinal Study of Swedish University Students (S. Kowalski). Managing the Virus Risk (M.P.J. Kratz, P.J. Johnston). Information Systems Auditing - A Support to Management (K.E. Kristiansen). Planning for Disaster Recovery in a Multi-Vendor, Networked Computing Environment (K.H. Krueger). Technical Criteria for Security Evaluation of IT Products (Y. Le Roux). Proactive Network Risk Management (J. Lobel). Data Privacy: Legislation and Intelligence Agency Threats (W. Madsen). Separation of Duties Audit Concerns and the Clark-Wilson Data Integrity Model (R.R. Moeller). Security in ODP Systems (S. Muftic). Auditing the SNA/SNI Environment (R. Paans, H. de Lange). Seventeen Information Security Myths Debunked (D.B. Parker). Modelling Security in Distributed Systems (H.P. Riess). Corporate Information Security Policy (B. Sarton, P. Capiteijns). Computer Assisted Investigation of Computer Crime (P.M. Stanley). Trouble Ahead: Information Crime and Jurisdiction (M. Tantam). Case Tools and Security: A Solution or a Problem? (L.T. Taylor).
by "Nielsen BookData"