Cargando…

Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings /

The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jahankhani, Hamid (Editor ), Hessami, Ali G. (Editor ), Hsu, Feng (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Communications in Computer and Information Science, 45
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!
  • A Security Audit Framework for Security Management in the Enterprise
  • Watermarking Spatial Data in Geographic Information Systems
  • Situation Awareness in Systems of Systems Ad-Hoc Environments
  • The Georgia's Cyberwar
  • The UK Government's Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture
  • Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
  • Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer's Trust
  • A Systems Framework for Sustainability
  • Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path
  • Geofencing in a Security Strategy Model
  • Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions
  • The Significance of Security in Transmitting Clinical Data
  • Security Concern over Earth Viewer Software Using Satellite Photo Service
  • The People's Republic of China - The Emerging Cyberpower
  • Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation
  • Neural Networks for Intrusion Detection Systems
  • Exploitation of Secrets Injected in Java Midlets
  • Biometrically Based Electronic Signatures for a Public Networked Environment
  • Policy Translation and Reconciliation Techniques for the System-of-Systems Domain
  • The Kido Botnet: Back to the Future
  • Information Systems Security and Its Affiliation to Information Technology Risk Management
  • A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea
  • Hey - Get Off My Cloud!
  • Static and Dynamic Analysis for Web Security in Generic Format.