Analyzing information security goals

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Threats, countermeasures, and advances in applied information security
1. Verfasser: Kolkowska, Ella (VerfasserIn)
Weitere Verfasser: Hedström, Karin (VerfasserIn), Karlsson, Fredrik (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2012
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A distributed and secure architecture for signature and decryption delegation through remote smart cards 2012 Cattaneo, Giuseppe
Information security management : awareness of threats in e-commerce 2012 Rahman, Mohammad Mahfuzur
Analyzing information security goals 2012 Kolkowska, Ella
Towards a framework for collaborative enterprise security 2012 Misra, Janardan
Can formal methods really help : analyzing the security of electronic voting systems 2012 Weldemariam, Komminist
Countering spam robots : scrambled CAPTCHA and Hindi CAPTCHA 2012 Raj, Aditya
Security in wireless sensor networks with mobile codes 2012
A pragmatic approach to intrusion response metrics 2012 Strasburg, Chris
Assessing the security of software configurations 2012 Neto, Afonso Araújo
Information security management based on linguistic sharing techniques 2012 Ogiela, Marek R.
SQL injection attacks countermeasures 2012 Amiratahmasebi, Kasra
Security and authentication issues of an embedded system designed and implemented for interactive Internet users 2012 Baruah, Siddhartha
Feature extraction methods for intrusion detection systems 2012 Hai Thanh Nguyen
Distributed key management scheme based on CL-PKC in P2P networks 2012 Li, Zhongwen
Security enhancement of peer-to-peer session initiation 2012 Zheng, Xianghan
Effective malware analysis using stealth breakpoints 2012 Vasudevan, Amit
Graphical passwords 2012 Catuogno, Luigi
A decision support system for privacy compliance 2012 Pearson, Siani
A privacy service for comparison of privacy and trust policies within SOA 2012 Allison, David S.
Creating and applying security goal indicator trees in an industrial environment 2012
Alle Artikel auflisten