Narrow your search
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Book
IT Governance Today : A Practitioner's Handbook
Authors: ---
ISBN: 1282384600 9786612384608 Year: 2005 Publisher: Ely : IT Governance Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book assesses the strengths and weaknesses - in the context of competitiveness, corporate governance demands and regulatory requirements - of current frameworks (including COSO, CoBIT, ITIL, ISO 15000, ISO17799, AS 8015, GAISP).


Book
Once more unto the Breach : Managing information security in an uncertain world
Author:
ISBN: 1849287104 Year: 2015 Publisher: Ely : IT Governance Ltd,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.

Digital identity management : perspectives on the technological, business and social implications
Author:
ISBN: 0566086794 9780566086793 9781315257792 9781351944106 9781138272682 Year: 2007 Publisher: Aldershot : Gower,


Book
Enterprise information security and privacy
Authors: --- ---
ISBN: 1596931906 1596931914 9781596931909 9781596931916 Year: 2009 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description.

Understanding public-key infrastructure : concepts, standards, and deployment considerations
Authors: ---
ISBN: 157870166X 9781578701667 Year: 1999 Publisher: Indianapolis (Ind.): Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security. --- Computer networks --- Business enterprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- Security measures --- -Computer networks --- -Public key infrastructure (Computer security) --- AA / International- internationaal --- 654 --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- -Security measures --- Informatieverwerking. Bureautica. --- Distributed processing --- Entreprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Sécurité --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer networks&delete& --- Informatieverwerking. Bureautica --- Computer networks - Security measures --- Business enterprises - Computer networks - Security measures

Trust, privacy, and security in digital business : second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings
Authors: --- --- ---
ISSN: 03029743 ISBN: 3540282246 3540317961 9783540282242 Year: 2005 Volume: 3592 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.

E-commerce security : weak links, best defenses.
Author:
ISBN: 0471192236 9780471192237 Year: 1998 Publisher: New York (N.Y.) Wiley


Book
Secure multi-party non-repudiation protocols and applications
Authors: --- ---
ISBN: 0387756299 1441945393 9786611850906 128185090X 0387756302 Year: 2009 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement. This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

Keywords

Business enterprises -- Computer networks -- Security measures. --- Electronic commerce -- Security measures. --- Electronic commerce. --- HeadingBusiness enterprises. --- Computer Science --- Marketing & Sales --- Engineering & Applied Sciences --- Commerce --- Business & Economics --- Electronic commerce --- Business enterprises --- Security measures. --- Computer networks --- Computer science. --- Computer organization. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer network architectures. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures

Listing 1 - 10 of 13 << page
of 2
>>
Sort by