|
|
|
|
LEADER |
04662nam a22005055i 4500 |
001 |
978-1-4020-8145-3 |
003 |
DE-He213 |
005 |
20151029211653.0 |
007 |
cr nn 008mamaa |
008 |
100301s2004 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781402081453
|9 978-1-4020-8145-3
|
024 |
7 |
|
|a 10.1007/b98991
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.M3
|
072 |
|
7 |
|a UYZM
|2 bicssc
|
072 |
|
7 |
|a UKR
|2 bicssc
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
245 |
1 |
0 |
|a Information Security Management, Education and Privacy
|h [electronic resource] :
|b IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France /
|c edited by Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2004.
|
300 |
|
|
|a XIII, 313 p. 25 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a IFIP International Federation for Information Processing,
|x 1571-5736 ;
|v 148
|
505 |
0 |
|
|a Corporate Information Security Education -- Towards Corporate Information Security Obedience -- CIIP-RAM- A Security Risk Analysis Methodology for Critical Information Infrastructure Protection -- A Framework for Role-Based Monitoring of Insider Misuse -- Update/Patch Management Systems -- Investigating a Smart Technology -- Laboratory Support for Information Security Education -- An Holistic Approach to an International Doctoral Program -- A New Paradigm for Information Security Education at Doctoral Level -- Highly Qualified Information Security Personnel Training in Russia -- Doctor of Philosophy: It Security -- Doctoral Programme on ICS Security at the University of the Aegean -- An International Security Education Perspective -- DO Military Forces Need Ph.D.’s? -- A Doctoral Program with Specialization in Information Security -- A Security Model for Anonymous Credential Systems -- Private Information Storage with Logarithmic-Space Secure Hardware -- Taxonomy of Mixes and Dummy Traffic -- Identity Management for Self-Portrayal -- Privacy Preserving Online Reputation Systems -- A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications -- Privacy-Invasive Software in Filesharing Tools -- Infusing Privacy Norms in DRM.
|
520 |
|
|
|a This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is organized by the IFIP WG 11. 1, which is itself dedicated to Information Security Management, i. e. , not only to the practical implementation of new security technology issued from recent research and development, but also and mostly to the improvement of security practice in all organizations, from multinational corporations to small enterprises. Methods and techniques are developed to increase personal awareness and education in security, analyze and manage risks, identify security policies, evaluate and certify products, processes and systems. Matt Warren, from Deakin University, Australia, who is the current Chair of WG 11. 1, acted as the Program Chair. The second workshop is organized by the IFIP WG 11. 8, dedicated to Information Security Education. This workshop is a follow-up of three issues of the World Conference on Information Security Education (WISE) that were also organized by WG 11. 8. The first WISE was organized by Louise Yngstrom in 1999 in Stockholm, and the next one, WISE’4, will be held in Moscow, Russia, 18-20 May 2005. This year, the workshop is aimed at developing a first draft of an international doctorate program allowing a specialization in IT Security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
700 |
1 |
|
|a Deswarte, Yves.
|e editor.
|
700 |
1 |
|
|a Cuppens, Frédéric.
|e editor.
|
700 |
1 |
|
|a Jajodia, Sushil.
|e editor.
|
700 |
1 |
|
|a Wang, Lingyu.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781402081446
|
830 |
|
0 |
|a IFIP International Federation for Information Processing,
|x 1571-5736 ;
|v 148
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b98991
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|