``Trusted'' Computing Technologies Opportunities and Problems (English)
- New search for: Cox, A.
- New search for: Cox, A.
In:
Institution of Engineering and Technology Conference on Crime and Security
;
89-96
;
2006
-
ISBN:
- Conference paper / Print
-
Title:``Trusted'' Computing Technologies Opportunities and Problems
-
Contributors:
-
Conference:Institution of Engineering and Technology Conference on Crime and Security ; 2006 ; London, England
-
Published in:
-
Publisher:
- New search for: Institution of Engineering and Technology
-
Place of publication:London
-
Publication date:2006-01-01
-
Size:8 pages
-
Remarks:Includes bibliographical references
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The Rules of Life - A Holistic Approach to SecurityGibson, E.P. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 3
-
Securing Citizen Inclusion, Take-up and Trust for Online ServicesWagar, D. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 15
-
Payment Card Industry Data Security Standard: Impact on Retail Information TechnologyDuffin, J. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 27
-
PCI DSS - Closing the Loop on `Card Not Present' FraudDocksey, R. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 39
-
How Secure is Wi-Fi Today?Jarvis, N. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 59
-
Personal Area Networks: A Hole in Your Pocket!Rowe, M. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 67
-
Trsuted Computing, Integrating Trust and Security into Computer PlatformsBrandl, H. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 81
-
Using Trusted Computing to Build a Safer WorldSadler, M. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 89
-
``Trusted'' Computing Technologies Opportunities and ProblemsCox, A. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 97
-
The Requirements of the Data Protection Act 1998Room, S. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 107
-
Identifying the Global UserBirch, S. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 115
-
The Importance of Employee Awareness to Information Security: Three Case StudiesSmith, M. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 129
-
Sharing Information with Less Risk!Lamb, S. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 147
-
eProduct Security, Compliance and RiskKing, S. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 153
-
Data Privacy: Fiction or Reality? How Much Privacy are Individuals Entitled to Under the Law?Singer, S. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 171
-
Database Security - The Forgotten ThreatLitchfield, D. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 183
-
MySQL Security: Best PracticesZoratti, I. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 199
-
How to Stay Secure in a Network without PerimetersKing, P. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 219
-
Endpoint Security - the Soft Centre Inside the Hard ShellKnight, S. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006
- 239
-
RFID SecurityRoyston, P. / E-Infrastructure Network (Institution of Engineering and Technology); Visual Information Engineering Network (Institution of Engineering and Technology); Multimedia Communications Network (Institution of Engineering and Technology) et al. | 2006