Securing information and communications systems
Securing information and communications systems principles, technologies, and applications / [electronic resource] :
Steven M. Furnell ... [et al.], editors.
- Boston : Artech House, c2008.
- xiv, 362 p. : ill. ; 27 cm.
- Artech House computer security series .
Includes bibliographical references and index.
Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security.
Electronic reproduction.
Palo Alto, Calif. :
ebrary,
2009.
Available via World Wide Web.
Access may be limited to ebrary affiliated libraries.
GBA877008 bnb
Uk
Computer security.
Computer networks--Security measures.
Data encryption (Computer science)
Electronic books.
QA76.9.A25 / S37563 2008eb
005.8
Includes bibliographical references and index.
Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security.
Electronic reproduction.
Palo Alto, Calif. :
ebrary,
2009.
Available via World Wide Web.
Access may be limited to ebrary affiliated libraries.
GBA877008 bnb
Uk
Computer security.
Computer networks--Security measures.
Data encryption (Computer science)
Electronic books.
QA76.9.A25 / S37563 2008eb
005.8