Five User-Customizable Web Site Security Features (English)
- New search for: Grossman, J.
- New search for: Grossman, J.
In:
IEEE Security & Privacy
;
6
, 6
;
79-81
;
2008
- Article (Journal) / Electronic Resource
-
Title:Five User-Customizable Web Site Security Features
-
Contributors:Grossman, J. ( author )
-
Published in:IEEE Security & Privacy ; 6, 6 ; 79-81
-
Publisher:
- New search for: IEEE
-
Publication date:2008-11-01
-
Size:710096 byte
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 6, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Table of contents| 2008
- 3
-
IEEE Security & Privacy masthead| 2008
- 4
-
Are Governments Up to the Task?Michael, B. et al. | 2008
- 4
-
From the Editors - Are Governments Up to the Task?Michael, Bret et al. | 2008
- 6
-
Silver Bullet Talks with Matt BishopMcGraw, Gary et al. | 2008
- 6
-
Interview - Silver Bullet Talks with Matt BishopMcGraw, Gary et al. | 2008
- 11
-
Launching into the Cyberspace Race: An Interview with Melissa E. HathawaySaydjari, O. Sami et al. | 2008
- 11
-
Spotlight - Launching into the Cyberspace Race: An Interview with Melissa E. HathawaySaydjari, O.Sami et al. | 2008
- 18
-
News - Shaking Up the Cybersecurity LandscapeFigueroa, James et al. | 2008
- 18
-
Shaking Up the Cybersecurity LandscapeFigueroa, J. / Ortega, B. et al. | 2008
- 20
-
News BriefsOrtega, Brandi et al. | 2008
- 22
-
Process Control Security - Guest Editors' IntroductionPalmer, Charles C. et al. | 2008
- 22
-
Process Control System Security: Bootstrapping a LegacyTrellue, Ron / Palmer, Charles C. et al. | 2008
- 24
-
Security for Process Control Systems: An Overview - IT security has become a dominant topic in the process control domain. The authors outline the core challenges, how industry is responding to them, and what problems remain.Brändle, Markus et al. | 2008
- 24
-
Security for Process Control Systems: An OverviewBrundle, M. / Naedele, M. et al. | 2008
- 30
-
Usable Global Network Access Policy for Process Control SystemsNicol, D.M. / Sanders, W.H. / Singh, S. / Seri, M. et al. | 2008
- 30
-
Usable Global Network Access Policy for Process Control Systems - PCS operators can use the Access Policy Tool to analyze their network configurations for compliance to best practice recommendations.Nicol, David M. et al. | 2008
- 37
-
Vulnerability Assessment for Critical Infrastructure Control Systems - Assessing the security of critical infrastructure control systems without understanding them can have dangerous real-world impact. Here's a guide for security assessors.Parks, Raymond C. et al. | 2008
- 37
-
Vulnerability Assessment for Critical Infrastructure Control SystemsParks, R.C. / Rogers, E. et al. | 2008
- 44
-
The Crutial Way of Critical Infrastructure ProtectionBessani, A.N. / Sousa, P. / Correia, M. / Neves, N.F. / Verissimo, P. et al. | 2008
- 44
-
The Crutial Way of Critical Infrastructure Protection - Critical infrastructures' failure has a high socioeconomic impact. The Crutial information switch is designed to protect them.Bessani, Alysson Neves et al. | 2008
- 52
-
SDRS: A Voice-over-IP Spam Detection and Reaction SystemMathieu, B. / Niccolini, S. / Sisalem, D. et al. | 2008
- 52
-
Voice over IP - SDRS: A Voice-over-IP Spam Detection and Reaction System - An expected surge in spam over Internet telephony requires a solution that incorporates multiple detection methods and reaction mechanisms, enabling greater flexibility and customization.Mathieu, Bertrand et al. | 2008
- 60
-
Trusted Computing - Challenges for Trusted Computing - Trusted computing is proving to be one of the most controversial technologies in recent years. The authors highlight some of the technical obstacles that might hinder trusted computing's widespread adoption.Balfe, Shane et al. | 2008
- 60
-
Challenges for Trusted ComputingBalfe, S. / Gallery, E. / Mitchell, C.J. / Paterson, K.G. et al. | 2008
- 67
-
Education - Teaching for Conceptual Change in Security AwarenessChan, Yuen-Yan et al. | 2008
- 67
-
Teaching for Conceptual Change in Security AwarenessYuen-Yan Chan, / Wei, V.K. et al. | 2008
- 70
-
HIPAA Security Enforcement Is HereNahra, K.J. et al. | 2008
- 70
-
Privacy Interests - HIPAA Security Enforcement Is HereNahra, Kirk J. et al. | 2008
- 73
-
Introduction to Microsoft .NET SecurityChengyun Chu, et al. | 2008
- 73
-
Basic Training - Introduction to Microsoft .NET SecurityChu, Chengyun et al. | 2008
- 78
-
Advertiser Index| 2008
- 79
-
Attack Trends - Five User-Customizable Web Site Security FeaturesGrossman, Jeremiah et al. | 2008
- 79
-
Five User-Customizable Web Site Security FeaturesGrossman, J. et al. | 2008
- 82
-
State of Application AssessmentSteven, J. et al. | 2008
- 82
-
Building Security In - State of Application AssessmentSteven, John et al. | 2008
- 86
-
For Good Measure - Security Is a Subset of ReliabilityGeer Jr, Daniel E. et al. | 2008
- 86
-
Security Is a Subset of ReliabilityGeer, D.E. / Conway, D.G. et al. | 2008
- 88
-
Complexity Is the EnemyGeer, D.E. et al. | 2008
- 88
-
Clear Text - Complexity Is the EnemyGeer Jr, Daniel E. et al. | 2008
- c1
-
[Front cover]| 2008
- c2
-
Digital Editions [advertisement]| 2008
- c3
-
IEEE Computer Society Membership [advertisement]| 2008
- c4
-
Southern California Linux Expo| 2008