Advances in Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security September 27–28, 2001, Las Vegas, Nevada, USA

Author:   Jan H.P. Eloff ,  Les Labuschagne ,  Rossouw von Solms ,  Gurpreet Dhillon
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2001
Volume:   72
ISBN:  

9781475774962


Pages:   216
Publication Date:   08 June 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $448.77 Quantity:  
Add to Cart

Share |

Advances in Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security September 27–28, 2001, Las Vegas, Nevada, USA


Add your own review!

Overview

The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) information security methods, methodologies and techniques, information security management issues, risk analysis, managing information security within electronic commerce, computer crime and intrusion detection. We are fortunate to have attracted two highly acclaimed international speakers to present invited lectures, which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues, all related to information security management and small system security issues. These talks cover new perspectives on electronic commerce, security strategies, documentation and many more. All papers presented at this conference were reviewed by a minimum of two international reviewers. We wish to express our gratitude to all authors of papers and the international referee board. We would also like to express our appreciation to the organising committee, chaired by Gurpreet Dhillon, for all their inputs and arrangements. Finally, we would like to thank Les Labuschagne and Hein Venter for their contributions in compiling this proceeding for WG11.1 and WG 11.2.

Full Product Details

Author:   Jan H.P. Eloff ,  Les Labuschagne ,  Rossouw von Solms ,  Gurpreet Dhillon
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2001
Volume:   72
Dimensions:   Width: 15.50cm , Height: 1.20cm , Length: 23.50cm
Weight:   0.355kg
ISBN:  

9781475774962


ISBN 10:   1475774966
Pages:   216
Publication Date:   08 June 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Reviewed papers.- Web Assurance.- A Model and Implementation Guidelines for Information Security Strategies in Web Environments.- A Three-dimensional Framework for Security Implementation in Mobile Environments.- Maintaining Integrity Within Mobile Self Protecting Objects.- Building on Solid Foundations.- Using GYPSIE, GYNGER and Visual GNY to Analyze Cryptographic Protocols in Spear II.- Security Vulnerabilities and System Intrusions.- A New Paradigm for Adding Security into is Development Methods.- Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module.- Security Documentation.- Transaction Based Risk analysis - Using Cognitive Fuzzy Techniques.- A Security Method for Healthcare Organisations.- Interpreting Computer-related Crime at the Malaria Research Center.- Intrusion Detection Systems: Possibilities for the Future.- Implementing Information Security Management Systems.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List