|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-31167-8 |
003 |
DE-He213 |
005 |
20230810135910.0 |
007 |
cr nn 008mamaa |
008 |
100301s2005 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387311678
|9 978-0-387-31167-8
|
024 |
7 |
|
|a 10.1007/0-387-31167-X
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Security Management, Integrity, and Internal Control in Information Systems
|h [electronic resource] :
|b IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference /
|c edited by Steve Furnell, Bhavani Thuraisingham, X. Sean Wang.
|
250 |
|
|
|a 1st ed. 2005.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2005.
|
300 |
|
|
|a XIV, 370 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a IFIP Advances in Information and Communication Technology,
|x 1868-422X ;
|v 193
|
505 |
0 |
|
|a Security Standards -- Information Security Standards: Adoption Drivers (Invited Paper) -- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper) -- From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) -- Security Culture -- How Much Should We Pay for Security? (Invited Paper) -- Do Not Ship, or Receive, Trojan Horses -- Employee Security Perception in Cultivating Information Security Culture -- Access Management -- A Policy Framework for Access Management in Federated Information Sharing -- A Hierarchical Release Control Policy Framework -- Risk Management -- Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC -- The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study -- Risk Communication, Risk Perception and Information Security -- A Holistic Risk Analysis Method for Identifying Information Security Risks -- Security Culture -- A Responsibility Framework for Information Security -- Information Security Governance - A Re-Definition -- Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper) -- Security Management -- Measurement of Information Security in Processes and Products -- A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises -- A UML Approach in the ISMS Implementation -- Applications -- Attack Aware Integrity Control in Databases (Invited Abstract) -- Characteristics and Measures for Mobile-Masquerader Detection -- A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions -- Access Management -- A Trust-Based Model for Information Integrity in Open Systems -- Scalable Access Policy Administration (Invited Paper) -- Semantic Information Infrastructure Protection (Invited Abstract).
|
520 |
|
|
|a International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Electronic digital computers
|x Evaluation.
|
650 |
|
0 |
|a Electronic data processing
|x Management.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|
650 |
2 |
4 |
|a Models of Computation.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Furnell, Steve.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Thuraisingham, Bhavani.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, X. Sean.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387510514
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441940056
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387298269
|
830 |
|
0 |
|a IFIP Advances in Information and Communication Technology,
|x 1868-422X ;
|v 193
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/0-387-31167-X
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|