Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Securing information and communications systems [electronic resource] : principles, technologies, and applications / Steven M. Furnell ... [et al.], editors.

Contributor(s): Furnell, Steven, 1970-.
Material type: TextTextSeries: Artech House information security and privacy series: Publisher: Boston : Artech House, c2008Description: 1 online resource (xiv, 362 p.) : ill.ISBN: 9781596932296 (electronic bk.); 1596932295 (electronic bk.).Subject(s): Computer security | Computer networks -- Security measures | Data encryption (Computer science) | S�ecurit�e informatique | R�eseaux d'ordinateurs -- S�ecurit�e -- Mesures | Chiffrement (Informatique) | Syst�emes informatiques -- S�ecurit�e -- Mesures | Infrastructure �a cl�e publique (S�ecurit�e informatique) | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- GeneralGenre/Form: Electronic books.Additional physical formats: Print version:: Securing information and communications systems.DDC classification: 005.8 Online resources: EBSCOhost
Contents:
Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security.
Summary: This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security.

This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter