Recovery of Financial Services Firms in the World Trade Center Post 9/11/01 (Englisch)
- Neue Suche nach: Beacham, A. E.
- Neue Suche nach: McManus, D. J.
- Neue Suche nach: Beacham, A. E.
- Neue Suche nach: McManus, D. J.
In:
INFORMATION SYSTEMS SECURITY
;
13
;
46-55
;
2004
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Recovery of Financial Services Firms in the World Trade Center Post 9/11/01
-
Beteiligte:Beacham, A. E. ( Autor:in ) / McManus, D. J. ( Autor:in )
-
Erschienen in:INFORMATION SYSTEMS SECURITY ; 13 ; 46-55
-
Verlag:
- Neue Suche nach: AUERBACH PUBLICATIONS
-
Erscheinungsdatum:01.01.2004
-
Format / Umfang:10 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 005.8 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 13
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 2
-
Maintaining Security and Privacy Requires Getting "Back to Basics"O Hanley, R. et al. | 2004
- 4
-
Document Theft: Appropriate ResponsesFreeman, E. H. et al. | 2004
- 5
-
Towards a Systematic Development of Secure SystemsBreu, R. / Burger, K. / Hafner, M. / Popp, G. et al. | 2004
- 9
-
Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness of the Incident Management ProcessWolf, L. J. et al. | 2004
- 11
-
Forensic Analysis of Risks in Enterprise SystemsStephenson, P. et al. | 2004
- 12
-
Protecting Yourself While Protecting Your Computer Data: Two Laws Make It More Important than EverAkerman, N. et al. | 2004
- 13
-
Security Event Analysis through CorrelationChuvakin, A. et al. | 2004
- 14
-
Efficient Tree Search in Encrypted DataBrinkman, R. / Feng, L. / Doumen, J. / Hartel, P. H. / Jonker, W. et al. | 2004
- 15
-
Access Control Systems and Methodology Digital Identities Can Tame the Wild, Wild WebMaster, A. et al. | 2005
- 18
-
The Nature of Cyber-attacks in the Future: A Position PaperGhosh, S. et al. | 2004
- 19
-
Monitoring Intrusion Detection Systems: From Data to KnowledgeConorich, D. G. et al. | 2004
- 21
-
Incorporating HIPAA Security Requirements into an Enterprise Security ProgramGeffert, B. T. et al. | 2004
- 22
-
Web Services Security: Is the Problem Solved?Gutierrez, C. / Fernandez-Medina, E. / Piattini, M. et al. | 2004
- 22
-
I'll Take an Order of Data Sensitivity with Some Integrity on the Side: Finding a Balance within Access Control ModelsFerson, P. et al. | 2004
- 23
-
An Anti-Sniffer Based on ARP Cache Poisoning AttackTrabelsi, Z. / Rahmani, H. et al. | 2005
- 26
-
Creating and Implementing MS Office SecurityNemzow, M. et al. | 2004
- 29
-
Secure Coding: Building Security into the Software Development Life CycleJones, R. L. / Rastogi, A. et al. | 2004
- 31
-
Application Security: Building in Security during the Development StageMain, A. et al. | 2004
- 32
-
The Impact of Virus Attack Announcements on the Market Value of FirmsHovav, A. / D Arcy, J. et al. | 2004
- 34
-
A New Role of Graph Theory: The Design of Probably Secure CryptoprotocolsHernandez-Goya, C. / Caballero-Gil, P. et al. | 2004
- 37
-
Information Security Management Reducing Enterprise Risk with Effective Threat ManagementDrew, S. et al. | 2005
- 38
-
The Twelve Principles of Trusted SolutionsSaunier, L. et al. | 2004
- 39
-
Understanding Internet Protocol SecurityThomas, J. / Elbirt, A. J. et al. | 2004
- 40
-
Oracle Database SecurityMehta, R. et al. | 2004
- 41
-
Fair Trading Protocol with Offline Anonymous Credit Card PaymentZhao, W. / Varadharajan, V. / Bryan, G. et al. | 2004
- 43
-
Law, Investigations, and Ethics SB1386: One Year LaterTinseth, A. / Richlin, D. et al. | 2005
- 44
-
Developing an Enterprisewide Policy StructurePeltier, T. R. et al. | 2004
- 44
-
Risk Analysis and Risk ManagementPeltier, T. R. et al. | 2004
- 46
-
Recovery of Financial Services Firms in the World Trade Center Post 9/11/01Beacham, A. E. / McManus, D. J. et al. | 2004
- 48
-
Filtering Spam at E-Mail Server Level with Improved CRM114Mendez, V. / Hernandez, J. C. / Carretero, J. / Garcia, F. et al. | 2004
- 51
-
Preventing Failure: The Value of Performing a Single Point of Failure Analysis for Critical Applications and SystemsWolf, L. J. et al. | 2004
- 51
-
Telecommunications, Network and Internet Security Cookies and PrivacyHormozi, A. M. et al. | 2005