This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends.
This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes.
Part of the Jones & Bartlett Learning Information Systems Security and Assurance Series http://www.issaseries.com Revised and updated to address the many changes in this evolving field, the Second Edition of Legal Issues in Information ...
This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime.
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
The 75 papers presented in these volumes were organized in topical sections as follows: Part I: anthropometry, ergonomics, design and comfort; human body and motion modelling; smart human-centered service system design; and human-robot ...
This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in ...
Sean P. Murphy. 253. References. 1. National Institute of Standards and Technology. “Guidelines for Managing the Security of Mobile Devices in the Enterprise.” By Murugiah Souppaya and Karen Scarfone. Special Publication 800-124, ...
Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the ...
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information ...