Security in Computing Systems: Challenges, Approaches and Solutions

Author:   Joachim Biskup
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   Softcover reprint of hardcover 1st ed. 2009
ISBN:  

9783642097195


Pages:   694
Publication Date:   19 October 2010
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $261.36 Quantity:  
Add to Cart

Share |

Security in Computing Systems: Challenges, Approaches and Solutions


Add your own review!

Overview

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ‘‘global information infrastructure’’ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

Full Product Details

Author:   Joachim Biskup
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   Softcover reprint of hardcover 1st ed. 2009
Dimensions:   Width: 15.50cm , Height: 3.60cm , Length: 23.50cm
Weight:   1.092kg
ISBN:  

9783642097195


ISBN 10:   3642097197
Pages:   694
Publication Date:   19 October 2010
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

Author Information

Joachim Biskup has been Professor of Computer Science since 1981 at the University of Dortmund, University of Hildesheim and University of Dortmund again. He has done research in recursion and complexity theory, information systems with an emphasis on database schema design, query optimization and mediation, and various aspects of security. He served on the program committees of many international conferences, including ICDT, FoIKS, ESORICS and IFIP WG 11.3 Conference on Database and Applications Security.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List