×







We sell 100% Genuine & New Books only!

Advances In Information Security Management & Small Systems Security2001 Edition at Meripustak

Advances In Information Security Management & Small Systems Security2001 Edition by Jan H.P. Eloff Les Labuschagne Rossouw Von Solms Gurpreet Dhillon , Springer

Books from same Author: Jan H.P. Eloff Les Labuschagne Rossouw Von Solms Gurpreet Dhillon

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 16969.00/- [ 11.00% off ]

    Seller Price: ₹ 15103.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Jan H.P. Eloff Les Labuschagne Rossouw Von Solms Gurpreet Dhillon
    PublisherSpringer
    ISBN9780792375067
    Pages216
    BindingHardback
    LanguageEnglish
    Publish YearSeptember 2001

    Description

    Springer Advances In Information Security Management & Small Systems Security2001 Edition by Jan H.P. Eloff Les Labuschagne Rossouw Von Solms Gurpreet Dhillon

    The Eighth Annual Working Conference of Information Security Management and Small Systems Security jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP) focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines organisations and countries to discuss the latest developments in (amongst others) information security methods methodologies and techniques information security management issues risk analysis managing information security within electronic commerce computer crime and intrusion detection. We are fortunate to have attracted two highly acclaimed international speakers to present invited lectures which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues all related to information security management and small system security issues. These talks cover new perspectives on electronic commerce security strategies documentation and many more. All papers presented at this conference were reviewed by a minimum of two international reviewers. We wish to express our gratitude to all authors of papers and the international referee board. We would also like to express our appreciation to the organising committee chaired by Gurpreet Dhillon for all their inputs and arrangements. Finally we would like to thank Les Labuschagne and Hein Venter for their contributions in compiling this proceeding for WG11.1 and WG 11.2. Table of contents : Preface. Acknowledgements. Reviewers. Reviewed papers. 1. Web Assurance: Information Security Management for e-commerce; L. Labuschagne. 2. A Model and Implementation Guidelines for Information Security Strategies in Web Environments; C. Margaritis N. Kolokotronis P. Papadopoulou P. Kanellis D. Martakos. 3. A Three-dimensional Framework for Security Implementation in Mobile Environments; B.R. Vinaja. 4. Maintaining Integrity within Mobile Self Protecting Objects; W. Brandi M. Olivier. 5. Building on Solid Foundations: An Information Security Case Study; E. Roos Lindgreen J.A. Cohen H. de Boer G. Uit de Bosch C. van Rinsum. 6. Using Gypsie Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II; E. Saul A. Hutchison. 7. Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks; S.M. Furnell M. Papadaki G. Magklaras A. Alayed. 8. A New Paradigm For Adding Security Into IS Development Methods; M. Siponen R. Baskerville. 9. Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module; J. Biggam A. Hogarth. 11. Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques; E. Smith J.H.P. Eloff. 12. A Security Method for Healthcare Organisations; M. Warren W. Hutchinson. 13. Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study; G. Dhillon L. Silva. 14. Intrusion Detection Systems: Possibilities for the Future; K.A. Forcht C. Allen B. Brodman D. Corning J. Kouns. 15. Implementing Information Security Management Systems; F. Bjoerck. Index of contributors.



    Book Successfully Added To Your Cart