|
![]() |
|||
|
||||
OverviewThis volume is a state-of-the-art collection of papers in the area of integrity within information systems, and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support IT and security personnel in securing complex information system infrastructures. The book represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: to present methods and techniques that will help business achieve the desired level of integrity in information systems and data; to present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; and to investigate the shortcomings in the technologies presently in use - shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002. Full Product DetailsAuthor: Michael GertzPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2003 ed. Volume: 124 Dimensions: Width: 15.50cm , Height: 1.20cm , Length: 23.50cm Weight: 0.760kg ISBN: 9781402074738ISBN 10: 1402074735 Pages: 232 Publication Date: 31 May 2003 Audience: General/trade , Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsOne. Refereed Papers.- 1. Concurrent Checking of Global Cross-database Integrity Constraints.- 2. Increasing the Accuracy of Time-tabled Condition Monitoring.- 3. Designing High Integrity Systems Using Aspects.- 4. Towards Effect Preservation of Updates with Loops.- 5. Application Controls in a Client/Server Environment.- 6. Protecting Java Component Integrity Against Trojan Horse Programs.- 7. Information Security: A Corporate Governance Issue.- Two. Invited Papers.- 8. The Very Brief History of Digital Evidence Standards.- 9. Multi-representation: A New Paradigm for Databases.- 10. The Impact of Web Services on Audit.- Three. Vendor White Papers.- 11. Integrity Mechanisms in German and International Payment Systems.- 12. Monitoring Mission Critical Data for Integrity and Availability.- Four. Tutorial “The Subversive Spreadsheet”.- 13. Stop that Subversive Spreadsheet!.- 14. A Typical Model Audit Approach.- Five. Panel.- 15. Opportunities and Challenges in Tracing Security Breaches.- Index of Contributors.- Index of Keywords.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |