Toward a New Framework for Information Security? (Englisch)
- Neue Suche nach: Parker, Donn B.
- Neue Suche nach: Bosworth, Seymour
- Neue Suche nach: Kabay, Michel E.
- Neue Suche nach: Whyne, Eric
- Neue Suche nach: Parker, Donn B.
In:
Computer Security Handbook
;
3.1-3.23
;
2012
-
ISBN:
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Toward a New Framework for Information Security?
-
Beteiligte:Bosworth, Seymour ( Herausgeber:in ) / Kabay, Michel E. ( Herausgeber:in ) / Whyne, Eric ( Herausgeber:in ) / Parker, Donn B. ( Autor:in )
-
Erschienen in:Computer Security Handbook ; 3.1-3.23
-
Verlag:
- Neue Suche nach: John Wiley & Sons, Inc.
-
Erscheinungsort:Hoboken, NJ, USA
-
Erscheinungsdatum:02.01.2012
-
Format / Umfang:23 pages
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1.1
-
Brief History and Mission of Information System SecurityBosworth, Seymour / Jacobson, Robert V. et al. | 2012
- 2.1
-
History of Computer CrimeKabay, M. E. et al. | 2012
- 3.1
-
Toward a New Framework for Information Security?Parker, Donn B. et al. | 2012
- 4.1
-
Hardware Elements of SecurityBosworth, Sy / Cobb, Stephen et al. | 2012
- 5.1
-
Data Communications and Information SecurityPanko, Raymond / Fisher, Eric et al. | 2012
- 6.1
-
Local Area Network Topologies, Protocols, and DesignKessler, Gary C. et al. | 2012
- 7.1
-
EncryptionCobb, Stephen / LeFrancois, Corinne et al. | 2012
- 8.1
-
Using a Common Language for Computer Security Incident InformationHoward, John D. et al. | 2012
- 9.1
-
Mathematical Models of Computer SecurityBishop, Matt et al. | 2012
- 10.1
-
Understanding Studies and Surveys of Computer CrimeKabay, M. E. et al. | 2012
- 11.1
-
Fundamentals of Intellectual Property LawZucker, William A. / Nathan, Scott J. et al. | 2012
- 12.1
-
The Psychology of Computer CriminalsCampbell, Q. / Kennedy, David M. et al. | 2012
- 13.1
-
The Insider ThreatTagg, Gary L. et al. | 2012
- 14.1
-
Information WarfareBosworth, Seymour et al. | 2012
- 15.1
-
Penetrating Computer Systems and NetworksCobb, Chey / Cobb, Stephen / Kabay, M. E. / Crothers, Tim et al. | 2012
- 16.1
-
Malicious CodeGuess, Robert / Salveggio, Eric et al. | 2012
- 17.1
-
Mobile CodeGezelter, Robert et al. | 2012
- 18.1
-
Denial‐of‐Service AttacksKessler, Gary C. et al. | 2012
- 19.1
-
Social‐Engineering and Low‐Tech AttacksRaman, Karthik / Baumes, Susan / Beets, Kevin / Ness, Carl et al. | 2012
- 20.1
-
Spam, Phishing, and Trojans: Attacks Meant to FoolCobb, Stephen et al. | 2012
- 21.1
-
Web‐Based VulnerabilitiesGhosh, Anup K. / Baumgarten, Kurt / Hadley, Jennifer / Lovaas, Steven et al. | 2012
- 22.1
-
Physical Threats to the Information InfrastructurePlatt, Franklin et al. | 2012
- 23.1
-
Protecting the Physical Information InfrastructurePlatt, Franklin et al. | 2012
- 24.1
-
Operating System SecurityStallings, William et al. | 2012
- 25.1
-
Local Area NetworksPritsky, N. Todd / Bumblis, Joseph R. / Kessler, Gary C. et al. | 2012
- 26.1
-
Gateway Security DevicesOpatrny, Justin et al. | 2012
- 27.1
-
Intrusion Detection and Intrusion Prevention DevicesBace, Rebecca Gurley et al. | 2012
- 28.1
-
Identification and AuthenticationSandhu, Ravi / Hadley, Jennifer / Lovaas, Steven / Takacs, Nicholas et al. | 2012
- 29.1
-
Biometric AuthenticationSalveggio, Eric / Lovaas, Steven / Lease, David R. / Guess, Robert et al. | 2012
- 30.1
-
E‐Commerce and Web Server SafeguardsGezelter, Robert et al. | 2012
- 31.1
-
Web Monitoring and Content FilteringLovaas, Steven et al. | 2012
- 32.1
-
Virtual Private Networks and Secure Remote AccessOpatrny, Justin / Ness, Carl et al. | 2012
- 33.1
-
802.11 Wireless Lan SecurityTagg, Gary L. / Sinchak, Jason et al. | 2012
- 34.1
-
Securing VoipDantos, Christopher / Mason, John et al. | 2012
- 35.1
-
Securing P2P, IM, SMS, and Collaboration ToolsNess, Carl et al. | 2012
- 36.1
-
Securing Stored DataJohnson, David J. / Takacs, Nicholas / Hadley, Jennifer / Kabay, M. E. et al. | 2012
- 37.1
-
Pki and Certificate AuthoritiesChokhani, Santosh / Peterson, Padgett / Lovaas, Steven et al. | 2012
- 38.1
-
Writing Secure CodeNichols, Lester E. / Kabay, M. E. / Braithwaite, Timothy et al. | 2012
- 39.1
-
Software Development and Quality AssuranceLevine, Diane E. / Mason, John / Hadley, Jennifer et al. | 2012
- 40.1
-
Managing Software Patches and VulnerabilitiesScarfone, Karen / Mell, Peter / Souppaya, Murugiah et al. | 2012
- 41.1
-
Antivirus TechnologyCobb, Chey / Myers, Allysa et al. | 2012
- 42.1
-
Protecting Digital Rights: Technical ApproachesGuess, Robert / Hadley, Jennifer / Lovaas, Steven / Levine, Diane E. et al. | 2012
- i
-
Front Matter| 2012
- I.1
-
Foundations of Computer Security| 2012
- II.1
-
Threats and Vulnerabilities| 2012
- III.1
-
Prevention: Technical Defenses| 2012