Discrete Event Dynamic Systems
Simulation Verification and Validation by Dynamic Policy Enforcement
ANSS '05 Proceedings of the 38th annual Symposium on Simulation
The myths and truths of wireless security
Communications of the ACM - Alternate reality gaming
Taming the diversity of information assurance & security
Journal of Computing Sciences in Colleges
Synthesis of trustworthy protocol specifications from service specifications
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A framework for engineering trustworthy computer systems
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Optimal resource allocation for securing an enterprise information infrastructure
Proceedings of the 4th international IFIP/ACM Latin American conference on Networking
Even more patterns for secure operating systems
Proceedings of the 2006 conference on Pattern languages of programs
Ontological Vulnerability Assessment
WISE '08 Proceedings of the 2008 international workshops on Web Information Systems Engineering
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
Journal of Systems Architecture: the EUROMICRO Journal
Database and database application security
ITiCSE '09 Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education
Challenges and complexities of managing information security
International Journal of Electronic Security and Digital Forensics
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
International Journal of Internet Technology and Secured Transactions
Interconnecting Smart Objects with IP: The Next Internet
Interconnecting Smart Objects with IP: The Next Internet
Security analysis of open building automation systems
SAFECOMP'10 Proceedings of the 29th international conference on Computer safety, reliability, and security
The pervasive trust foundation for security in next generation networks
Proceedings of the 2010 workshop on New security paradigms
An audit framework to support information system security management
International Journal of Electronic Security and Digital Forensics
Unifying facets of information integrity
ICISS'10 Proceedings of the 6th international conference on Information systems security
Security education on a budget: getting the most "bang for the buck" with limited time and resources
2010 Information Security Curriculum Development Conference
Cyber risks to secure and private universal access
UAHCI'11 Proceedings of the 6th international conference on Universal access in human-computer interaction: design for all and eInclusion - Volume Part I
A method for security governance, risk, and compliance (GRC): a goal-process approach
Foundations of security analysis and design VI
Proceedings of the 2011 conference on Information technology education
A survey of security in multi-agent systems
Expert Systems with Applications: An International Journal
Harnessing ANN for a secure environment
ISNN'10 Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part II
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
A Novel Web-enabled Healthcare Solution on HealthVault System
Journal of Medical Systems
From MDM to DB2: a case study of security enforcement migration
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
GlassTube: a lightweight approach to web application integrity
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security
Integrity in very large information systems: dealing with information risk black swans
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Secure, usable biometric authentication systems
UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
Hi-index | 0.00 |
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information SecurityFor years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends.The authors first introduce the core concepts and vocabulary of computer security, including attacks and controls. Next, the authors systematically identify and assess threats now facing programs, operating systems, database systems, and networks. For each threat, they offer best-practice responses.Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using the Advanced Encryption System (AES) more effectively Balancing dissemination with piracy control in music and other digital content Countering new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit