Information Security Management: The Second Generation (English)
- New search for: Solms, Rossouw von
- New search for: Solms, Rossouw von
In:
Computers & security
;
15
, 4
; 281-288
;
1996
-
ISSN:
- Article (Journal) / Print
-
Title:Information Security Management: The Second Generation
-
Contributors:Solms, Rossouw von ( author )
-
Published in:Computers & security ; 15, 4 ; 281-288
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:1996
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 15, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 268
-
From the Editor| 1996
- 270
-
Illustrating a Security Manual| 1996
- 270
-
Statistics and Ethics| 1996
- 270
-
Value of Security Statistics| 1996
- 270
-
Database Security| 1996
- 270
-
Unix: Use, Control and Audit| 1996
- 270
-
Random Bits & BytesHighland, Harold Joseph et al. | 1996
- 281
-
Information Security Management: The Second GenerationSolms, Rossouw von et al. | 1996
- 289
-
Using RAD Tools to Develop Secure Client-Server ApplicationsLemieux, Jacques et al. | 1996
- 297
-
The Information Security Chain in a CompanyFinne, Thomas et al. | 1996
- 317
-
Abstracts of recent articles and literature| 1996
- 323
-
Calendar of forthcoming conferences and events| 1996
- 325
-
International Board of Referees| 1996
- 327
-
An implementable secure voting schemeBorrell, Joan et al. | 1996
- 339
-
A collision-free secret ballot protocol for computerized general electionsJuang, Wen-Shenq et al. | 1996
- 349
-
IFIP Technical Committee 11| 1996
- 352
-
Guide for Authors| 1996