Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France

Author:   Yves Deswarte ,  Frederic Cuppens ,  Sushil Jajodia ,  Lingyu Wang
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2004
Volume:   148
ISBN:  

9781475780147


Pages:   313
Publication Date:   30 May 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France


Add your own review!

Overview

This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is organized by the IFIP WG 11. 1, which is itself dedicated to Information Security Management, i. e. , not only to the practical implementation of new security technology issued from recent research and development, but also and mostly to the improvement of security practice in all organizations, from multinational corporations to small enterprises. Methods and techniques are developed to increase personal awareness and education in security, analyze and manage risks, identify security policies, evaluate and certify products, processes and systems. Matt Warren, from Deakin University, Australia, who is the current Chair of WG 11. 1, acted as the Program Chair. The second workshop is organized by the IFIP WG 11. 8, dedicated to Information Security Education. This workshop is a follow-up of three issues of the World Conference on Information Security Education (WISE) that were also organized by WG 11. 8. The first WISE was organized by Louise Yngstrom in 1999 in Stockholm, and the next one, WISE’4, will be held in Moscow, Russia, 18-20 May 2005. This year, the workshop is aimed at developing a first draft of an international doctorate program allowing a specialization in IT Security.

Full Product Details

Author:   Yves Deswarte ,  Frederic Cuppens ,  Sushil Jajodia ,  Lingyu Wang
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2004
Volume:   148
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   0.510kg
ISBN:  

9781475780147


ISBN 10:   1475780141
Pages:   313
Publication Date:   30 May 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Corporate Information Security Education.- Towards Corporate Information Security Obedience.- CIIP-RAM- A Security Risk Analysis Methodology for Critical Information Infrastructure Protection.- A Framework for Role-Based Monitoring of Insider Misuse.- Update/Patch Management Systems.- Investigating a Smart Technology.- Laboratory Support for Information Security Education.- An Holistic Approach to an International Doctoral Program.- A New Paradigm for Information Security Education at Doctoral Level.- Highly Qualified Information Security Personnel Training in Russia.- Doctor of Philosophy: It Security.- Doctoral Programme on ICS Security at the University of the Aegean.- An International Security Education Perspective.- DO Military Forces Need Ph.D.’s?.- A Doctoral Program with Specialization in Information Security.- A Security Model for Anonymous Credential Systems.- Private Information Storage with Logarithmic-Space Secure Hardware.- Taxonomy of Mixes and Dummy Traffic.- Identity Management for Self-Portrayal.- Privacy Preserving Online Reputation Systems.- A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications.- Privacy-Invasive Software in Filesharing Tools.- Infusing Privacy Norms in DRM.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List