Current Developments in Open Systems Security (Englisch)
- Neue Suche nach: Poole, V.
- Neue Suche nach: Adams, D.
- Neue Suche nach: Poole, V.
- Neue Suche nach: Adams, D.
In:
Computer security, audit and control
;
274-275
;
1995
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Current Developments in Open Systems Security
-
Beteiligte:
-
Kongress:World conference; 12th, Computer security, audit and control ; 1995 ; London
-
Erschienen in:Computer security, audit and control ; 274-275PROCEEDINGS OF COMPSEC INTERNATIONAL ; 274-275
-
Verlag:
- Neue Suche nach: Elsevier Science
-
Erscheinungsdatum:01.01.1995
-
Format / Umfang:2 pages
-
Anmerkungen:Incorporating the 4th Annual Director's briefing on computer security. Also known as Compsec 95
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Using Firewalls to Provide Secure Internet AccessSherwood, J. et al. | 1995
- 22
-
A New Perspective on FirewallsSchultz, E. et al. | 1995
- 27
-
Publication of Tools and VulnerabilitiesGordon, S. et al. | 1995
- 39
-
Project SATAN: Unix/Internet SecurityVenema, W. et al. | 1995
- 45
-
Securing access and privacy on the InternetMadsen, W. et al. | 1995
- 45
-
Security Access and Privacy on the InternetMadsen, W. et al. | 1995
- 73
-
Controls in the Next Millennium: Anticipating the IT-Enabled FutureKrull, A. R. et al. | 1995
- 73
-
Controls in the next millenium: anticipating the IT-enabled futureKrull, A.R. et al. | 1995
- 78
-
Software Piracy - An UpdateWebster, G. et al. | 1995
- 84
-
Writing InfoSec PoliciesWood, C. C. et al. | 1995
- 95
-
A New Model for Information Security PoliciesLindup, K. et al. | 1995
- 122
-
Outsourcing - Ensuring Security ComplianceTanner, R. et al. | 1995
- 130
-
Smart Cards and Biometrics: An OverviewBovelander, E. / Van Renesse, R. L. et al. | 1995
- 140
-
Crypto System Initialization: Simplifying the Distribution of Initial KeysMeyer, C. H. et al. | 1995
- 167
-
Controlling the Use of Cryptographic KeysHolloway, C. J. et al. | 1995
- 185
-
Controlling Digital Signature Services Using a Smart CardHolloway, C. J. et al. | 1995
- 200
-
New Operating Systems and Old VirusesHruska, J. et al. | 1995
- 205
-
Value Added System Development AuditingMitchell, J. et al. | 1995
- 239
-
An Introduction to MVS SMF ProcessingCrocker, N. et al. | 1995
- 251
-
Open Systems Security: Traps and PitfallsReid, J. et al. | 1995
- 274
-
Current Developments in Open Systems SecurityPoole, V. / Adams, D. et al. | 1995
- 276
-
Achieving inter-operable security services in open system productsSmith, P. et al. | 1995
- 276
-
Achieving Interoperable Security Services in Open Systems ProductsSmith, P. et al. | 1995
- 286
-
The Spook Solution - Now Open for BusinessBuckwell, M. et al. | 1995
- 296
-
Dial-Thru' Fraud: The Ramifications for a BusinessMulhall, T. et al. | 1995
- 303
-
Wireless Network SecurityWood, C. C. et al. | 1995
- 309
-
X.400 Security: Current and Future UsageHughes, J. et al. | 1995
- 318
-
The Impact of ATM on Security in the Data NetworkHanson, L. et al. | 1995
- 325
-
Physical Layer Network Security: What Your LAN Can Do for YouBanes, D. W. et al. | 1995
- 330
-
CD-ROM Security IssuesNewman, P. et al. | 1995
- 339
-
Developing Legal Risks in MultimediaKelman, A. et al. | 1995
- 344
-
Facing the Challenge of IT SecuritySmith, M. et al. | 1995
- 350
-
IT Security: An Implementation StrategyParkin, R. et al. | 1995
- 364
-
Business Continuity PlanningSherwood, J. et al. | 1995
- 378
-
An International Perspective on IT SecurityVince, J. et al. | 1995
- 393
-
The Changing Risks Associated with Computer Systems as Reflected by Disaster Recovery ExperiencesTaylor, F. et al. | 1995
- 409
-
Why Waste Money on Disaster Recovery Planning?Hiles, A. et al. | 1995
- 417
-
Marketing Information Systems AuditKrull, A. R. et al. | 1995
- 421
-
Automated Audit: An Introduction to Tools and TechniquesCrocker, N. et al. | 1995
- 433
-
Internet Tools for AuditorsOliphant, A. et al. | 1995
- 440
-
Data Protection in the Information Superhighway EraFrance, E. et al. | 1995
- 440
-
Data protection in the information highway eraFrance, E. et al. | 1995
- 445
-
Social Engineering: Techniques and PreventionGordon, S. et al. | 1995
- 452
-
Dial-up and Remote Access Facilities for LANsHancock, B. et al. | 1995
- 480
-
Security Implications of Network Infrastructure MigrationWood, P. et al. | 1995
- 488
-
OS/2 Security Enabling Services (SES)Cogle, G. et al. | 1995
- 493
-
Using Artificial Intelligence to Combat Financial CrimeGalliers, K. et al. | 1995
- 502
-
Derivatives and Assessing Their RisksBolton, A. et al. | 1995
- 508
-
EDI Security and the InternetDosdale, T. et al. | 1995
- 514
-
Security Issues in Contemporary BankingOsborne, K. et al. | 1995
- 524
-
Beyond the Code of Practice: Information Highways and CryptographyHickson, N. et al. | 1995
- 540
-
Standards - The Need for a Common FrameworkHardy, G. et al. | 1995
- 548
-
Auditing and Accounting: Usage and RequirementsHughes, J. et al. | 1995
- 555
-
Why the Bad Guys Are WinningSchultz, E. et al. | 1995