A methodology for developing trusted information systems: the security requirements analysis phase

  • Authors:
  • Maria Grazia Fugini;Pierluigi Plebani

  • Affiliations:
  • Politecnico di Milano, Italy;Politecnico di Milano, Italy

  • Venue:
  • Current security management & Ethical issues of information technology
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This chapter is a topical overview of network security software and related skills needed by network users, IT professionals, and network security specialists. Covered topics are protection against viruses and other malicious programs, firewall software, ...