IT Security
Home > Computing and Information Technology > Information technology: general topics > Social and ethical aspects > IT Security: The Need for International Cooperation - Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92 Singapor(v. A-15 IFIP Transactions A: Computer Science and Technology)
IT Security: The Need for International Cooperation - Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92 Singapor(v. A-15 IFIP Transactions A: Computer Science and Technology)

IT Security: The Need for International Cooperation - Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92 Singapor(v. A-15 IFIP Transactions A: Computer Science and Technology)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The original title of IFIP/Sec'92, "From Small Systems to Large," was chosen, not to de-emphasize the continuing importance of security in large computer systems, but to direct attention to the increasing importance of smaller computer systems and their related security and control concerns. Trends contributing to the increased importance of small systems include: downsizing - the replacement of large central systems with smaller distributed systems, increasingly powerful microcomputers, the increasing sophistication and acceptance of LANs, end-user computing, and the devolution of IS management to functional management. The final title, "The Need for International Cooperation", derives from what became the central topic of discussion. The mix of papers in this book is both managerial and technical. Sections with relatively greater managerial content are: Security Management, IS Audit, and Computer Crime. The more technical sections are Database Security, Access Control and Detection, UNIX Security, Network Security, and Cryptography. Most papers have managerial, organisational and technical dimensions.

Table of Contents:
Keynote and Invited Papers. International Information Technology (IT) Security Cooperation into the 21st Century (W. Madsen). Computer Disasters: The Impact on Business in the 1990's (A. Reed). ASEAN - Computer Crime and Corrective Action: A Status Report (T.S. Chew). Security Management I. Information Security: The Impact of End User Computing (J. Beatson). PRAJORIS - A Pragmatic 'Joint' Method for Raising the Information Security Level in a Company (S. Bentzen). The Status of IT Security in Leading European Organisations (A. Stanley). Findings of the Swedish CITI Project on Information Security Evaluation and Certification (P. Hoving, M. Ohlin, J. Rylander). Network Security. Secure Open Systems: An Investigation of Current Standardization Efforts for Security in Open Systems (P. Overbeek). Network Security: Design of a Global Secure Link (W. Wang, T. Coffey). MAPS - Model for Automated Profile Specification (D. Pottas, S.H. von Solms). Cryptography and the Art of Securing Transactions (C. Holloway). Restating the Foundation of Information Security (D.B. Parker). Security Management II. Data Security Model for Branch Offices of Big Organisations (L.J. Janczewski). Practical Security for the Small Computer User (D. Bachelor, P. Kingston). Information Security Awareness - Selling the Cause (K. McLean). A Company's Battle Against the Virus Plague (P. Capiteijns). IS Audit. How Expert are Auditors in the Computer Security Field? South African Findings and Interpretations (D. Fink). IS Audit Research: A Paradigm and a Framework (C. Soh, G.G. Gable). Cryptography. Measuring the Strength of Ciphers (H. Gustafson et al.). Cryptographic Protocols and Network Security (P. Horster, H.-J. Knobloch). A Solution to Generalized Group Oriented Cryptography (C.-C. Chang, H.-C. Lee). A Methodology For Describing Information and Physical Security Architectures (W.J. Caelli, D. Longley, A. Tickle). Computer Crime I. A Methodology for the Investigation of Computer Crime (P.M. Stanley). Deterring Highly Motivated Computer Abusers: A Field Experiment in Computer Security (D. Straub, P.J. Carlson, E.H. Jones). IT Crime - An Intelligence Report (B. Fortrie). UNIX Operating System Security (J. Clark). Database Security. DISCO - A Discretionary Security Model for Object-Oriented Databases (M.S. Olivier, S.H. von Solms). Referential Integrity in Multilevel Secure Database Management Systems (V.M. Doshi, S. Jajodia). A Complex Approach to the Security of Statistical Databases Subject to Off-Line Sum Queries (Y.-M. Chee, A. Lim). UNIX Security. The New Security Paradigm in the Enterprise Computing Environment (C. Rubin). Integrating B2 Security into a UNIX System (K.H. Brady). Access Control/Detection. Rule-Based Trusted Access Control (M.D. Abrams, I.M. Olson). Governmentware: A New Vehicle to Boost Computer Security on a National Level (C.-S. Yu). A Rule-Based Intrusion Detection System (D. Holden). Access Control - A Further Approach (B. Lau). Computer Crime II.


Best Sellers


Product Details
  • ISBN-13: 9780444896995
  • Publisher: Elsevier Science & Technology
  • Publisher Imprint: Elsevier Science Ltd
  • Height: 230 mm
  • Sub Title: The Need for International Cooperation - Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92 Singapor
  • ISBN-10: 0444896996
  • Publisher Date: 22 Oct 1992
  • Binding: Paperback
  • Series Title: v. A-15 IFIP Transactions A: Computer Science and Technology


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
IT Security: The Need for International Cooperation - Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92 Singapor(v. A-15 IFIP Transactions A: Computer Science and Technology)
Elsevier Science & Technology -
IT Security: The Need for International Cooperation - Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92 Singapor(v. A-15 IFIP Transactions A: Computer Science and Technology)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

IT Security: The Need for International Cooperation - Proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92 Singapor(v. A-15 IFIP Transactions A: Computer Science and Technology)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!