Coverart for item
The Resource Information Security Management & Small Systems Security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands, edited by Jan H. P. Eloff, Les Labuschagne, Rossouw Solms, Jan Verschuren, (electronic resource)

Information Security Management & Small Systems Security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands, edited by Jan H. P. Eloff, Les Labuschagne, Rossouw Solms, Jan Verschuren, (electronic resource)

Label
Information Security Management & Small Systems Security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands
Title
Information Security Management & Small Systems Security
Title remainder
IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands
Statement of responsibility
edited by Jan H. P. Eloff, Les Labuschagne, Rossouw Solms, Jan Verschuren
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This book presents a state-of-the-art review of current perspectives in information security management and small systems security, focusing on technical and functional as well as managerial issues. It contains the selected proceedings of the Seventh Annual Working Conference on Information Security Management and Small Systems Security, sponsored by the International Federation for Information Processing (IFIP) and held in Amsterdam, The Netherlands, in September/October 1999. Topics in this volume include the latest developments in: Secure techniques for smart card technology; Information security management issues; Risk analysis; Intranets; Electronic commerce protocols; Certification and accreditation; Biometrics authentication. £/LIST£ This volume will be essential reading for researchers in computer science, information technology, and business informatics, as well as for information security consultants, systems analysts and engineers, and IT managers
Member of
http://library.link/vocab/creatorName
Eloff, Jan H. P
Image bit depth
0
LC call number
QA76.9.M3
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Labuschagne, Les.
  • Solms, Rossouw.
  • Verschuren, Jan.
  • SpringerLink
Series statement
IFIP — The International Federation for Information Processing,
Series volume
26
http://library.link/vocab/subjectName
  • Computer science
  • Data structures (Computer science)
  • Information storage and retrieval systems
  • Information Systems
  • Management information systems
  • Computer Science
  • Management of Computing and Information Systems
  • Data Structures, Cryptology and Information Theory
  • Business Information Systems
  • Information Storage and Retrieval
Label
Information Security Management & Small Systems Security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands, edited by Jan H. P. Eloff, Les Labuschagne, Rossouw Solms, Jan Verschuren, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
one — Reviewed papers -- 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards -- 2. Real-time Risk Analysis on the Internet: a prototype -- 3. A practical approach to manage data communication security -- 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444? -- 5. The Effective Utilization of Audit Logs in Information Security Management -- 6. An approach to standardizing security analysis methods for virtual systems -- 7. Information Security at Top Level — Securometer® streamlines management information -- 8. Risk analysis on Internet connection -- 9. A Secure Station for Network Monitoring and Control -- 10. Security aspects of a Java-servlet-based web-hosted e-mail system -- 11. Time as an Aid to Improving Security in Smart Cards -- 12. The Intranet Authorization Paradigm -- 13. Predicting the Performance of Transactional Electronic Commerce Protocols -- two — Invited papers -- 14. The Cyber-Posture of the National Information Infrastructure -- 15. Principles of Iris Recognition -- 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry -- 17. New models for the management of public key infrastructure and root certification authorities -- 18. A Secure Electronic Commerce Environment: Only with “Smart Cards” -- Index of contributors
Dimensions
unknown
Extent
XI, 243 p.
File format
multiple file formats
Form of item
electronic
Isbn
9780387355757
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-0-387-35575-7
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-0-387-35575-7
Label
Information Security Management & Small Systems Security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands, edited by Jan H. P. Eloff, Les Labuschagne, Rossouw Solms, Jan Verschuren, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
one — Reviewed papers -- 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards -- 2. Real-time Risk Analysis on the Internet: a prototype -- 3. A practical approach to manage data communication security -- 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444? -- 5. The Effective Utilization of Audit Logs in Information Security Management -- 6. An approach to standardizing security analysis methods for virtual systems -- 7. Information Security at Top Level — Securometer® streamlines management information -- 8. Risk analysis on Internet connection -- 9. A Secure Station for Network Monitoring and Control -- 10. Security aspects of a Java-servlet-based web-hosted e-mail system -- 11. Time as an Aid to Improving Security in Smart Cards -- 12. The Intranet Authorization Paradigm -- 13. Predicting the Performance of Transactional Electronic Commerce Protocols -- two — Invited papers -- 14. The Cyber-Posture of the National Information Infrastructure -- 15. Principles of Iris Recognition -- 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry -- 17. New models for the management of public key infrastructure and root certification authorities -- 18. A Secure Electronic Commerce Environment: Only with “Smart Cards” -- Index of contributors
Dimensions
unknown
Extent
XI, 243 p.
File format
multiple file formats
Form of item
electronic
Isbn
9780387355757
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-0-387-35575-7
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-0-387-35575-7

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...