|
![]() |
|||
|
||||
OverviewA report on the current status of important research topics in algebraic geometry and its applications, such as computational algebra and geometry, singularity theory algorithms, numerical solutions of polynomial systems, coding theory, communication networks, and computer vision. Contributions on more fundamental aspects of algebraic geometry include expositions related to counting points on varieties over finite fields, Mori theory, linear systems, Abelian varieties, vector bundles on singular curves, degenerations of surfaces, and mirror symmetry of Calabi-Yau manifolds. Full Product DetailsAuthor: Jan H.P. Eloff , Les Labuschagne , Rossouw von Solms , Gurpreet DhillonPublisher: Springer Imprint: Springer Edition: 2001 ed. Volume: 72 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 0.511kg ISBN: 9780792375067ISBN 10: 0792375068 Pages: 216 Publication Date: 30 September 2001 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPreface. Acknowledgements. Reviewers. Reviewed papers. 1. Web Assurance: Information Security Management for e-commerce; L. Labuschagne. 2. A Model and Implementation Guidelines for Information Security Strategies in Web Environments; C. Margaritis, N. Kolokotronis, P. Papadopoulou, P. Kanellis, D. Martakos. 3. A Three-dimensional Framework for Security Implementation in Mobile Environments; B.R. Vinaja. 4. Maintaining Integrity within Mobile Self Protecting Objects; W. Brandi, M. Olivier. 5. Building on Solid Foundations: An Information Security Case Study; E. Roos Lindgreen, J.A. Cohen, H. de Boer, G. Uit de Bosch, C. van Rinsum. 6. Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II; E. Saul, A. Hutchison. 7. Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks; S.M. Furnell, M. Papadaki, G. Magklaras, A. Alayed. 8. A New Paradigm For Adding Security Into IS Development Methods; M. Siponen, R. Baskerville. 9. Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module; J. Biggam, A. Hogarth. 11. Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques; E. Smith, J.H.P. Eloff. 12. A Security Method for Healthcare Organisations; M. Warren, W. Hutchinson. 13. Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study; G. Dhillon, L. Silva. 14. Intrusion Detection Systems: Possibilities for the Future; K.A. Forcht, C. Allen, B. Brodman, D. Corning, J. Kouns. 15. Implementing Information Security Management Systems; F. Björck. Index of contributors.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |