Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings /
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Communications in Computer and Information Science,
45 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!
- A Security Audit Framework for Security Management in the Enterprise
- Watermarking Spatial Data in Geographic Information Systems
- Situation Awareness in Systems of Systems Ad-Hoc Environments
- The Georgia's Cyberwar
- The UK Government's Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture
- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer's Trust
- A Systems Framework for Sustainability
- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path
- Geofencing in a Security Strategy Model
- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions
- The Significance of Security in Transmitting Clinical Data
- Security Concern over Earth Viewer Software Using Satellite Photo Service
- The People's Republic of China - The Emerging Cyberpower
- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation
- Neural Networks for Intrusion Detection Systems
- Exploitation of Secrets Injected in Java Midlets
- Biometrically Based Electronic Signatures for a Public Networked Environment
- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain
- The Kido Botnet: Back to the Future
- Information Systems Security and Its Affiliation to Information Technology Risk Management
- A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea
- Hey - Get Off My Cloud!
- Static and Dynamic Analysis for Web Security in Generic Format.