Listing 1 - 5 of 5 |
Sort by
|
Choose an application
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Computer networks - Security measures. --- Multicasting (Computer networks) - Security measures. --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Multicasting (Computer networks) - Security measures --- Computer networks - Security measures
Choose an application
Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, fromboth an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization.The book covers a broad range of issues, starting with an assessment of network security, including the financial implications of security breaches, and moving on to discuss the diff
Choose an application
Crime, Criminology and Law Enforcement --- General and Others --- Intellectual Property. --- Law. --- Law --- Mathematical Sciences --- Intellectual Property --- Applied Mathematics --- veiligheid (technologie) --- veiligheidstechnieken --- privacy --- cryptologie --- Periodicals --- Computer security --- Computer networks --- Security measures --- Computer security - Periodicals --- Computer networks - Security measures - Periodicals
Choose an application
Computer networks --- Security measures --- Access control --- 681.3*D46 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Monograph --- Data sovereignty --- Computer networks - Security measures --- Computer networks - Access control
Choose an application
The Sixth International Financial Cryptography Conference was held during March 11-14, 2002, in Southampton, Bermuda. As is customary at FC, these proceedings represent "final" versions of the papers presented, revised to take into account comments and discussions from the conference. Submissions to the conference were strong, with 74 papers submitted and 19 accepted for presentation and publication. (Regrettably, three of the submit ted papers had to be summarily rejected after it was discovered that they had been improperly submitted in parallel to other conferences.) The small program committee worked very hard under a tight schedule (working through Christmas day) to select the program. No program chair could ask for a better committee; my thanks to everyone for their hard work and dedication. In addition to the refereed papers, the program included a welcome from the Minister of Telecommunications and e-Commerce, Renee Webb, a keynote address by Nigel Hickson, and a panel on privacy tradeoffs cheiired by Rebecca Wright (with panelists Ian Goldberg, Ron Rivest, and Graham Wood). The traditional Tuesday evening "rump session" was skillfully officiated by Markus Jakobsson. My job as program chair was made much, much easier by the excellent work of our general chair, Nicko van Someren, who performed the miracle of hiding from me any evidence of the innumerable logistical nightmares associated with conducting this conference. I have no idea how he did it, but it must have involved many sleepless nights.
Computer networks -- Security measures -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electronic funds transfers -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Electronic funds transfers --- Data encryption (Computer science) --- Electronic commerce --- Internet --- Computer networks --- Banking --- Finance --- Business & Economics --- Security measures --- DARPA Internet --- Internet (Computer network) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Computer science. --- Finance. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Management information systems. --- E-commerce. --- Computer Science. --- Data Encryption. --- Finance, general. --- Computer Communication Networks. --- Operating Systems. --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Wide area networks (Computer networks) --- World Wide Web --- Commerce --- Information superhighway --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Information Systems. --- Cryptology. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Funding --- Funds --- Economics --- Currency question --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Operating systems --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing
Listing 1 - 5 of 5 |
Sort by
|