Tipo de ítem | Ubicación | Signatura topográfica | Copia | Estado | Fecha de vencimiento |
---|---|---|---|---|---|
Libros |
Colección general
Colección General de la BibliotecaUNM |
005.8 PROC 963 (Navegar estantería) | Ej. C | Disponible |
005.82 GOME 633 Matemáticos, espías y piratas informáticos : | 005.8 COMP 736 Computer security handbook / | 005.8 COMP 736 Computer security reference book / | 005.8 PROC 963 Computer security | 006.3 CAIR 136 El hombre artificial : | 006.3 CAIR 136 El hombre artificial : |
Kristian Beckman awards address : a view of information security tomorrow / Harold Joseph Highland. p. 1-12.
Openning keynote adress : the evolution of IT security convergence / Patrick R. Gallagher, Jr. p. 13-22.
Teaching security basics: the importance of when and how / Viiveke Fák and Amund Hunstad. p. 23-30.
The MSc in information security at Royal Holloway / Dieter Gollmann. p. 31-36.
Information security in the small systems context : a framework for understanding / Guy G. Gable and Harold Joseph Higland. p. 37-52.
Developing awareness, training and education : a cost effective tool for maintaining system integrity / Corey D. Schou ; W. Vic Maconachy ; James Frost. p. 53-64.
Teaching computer security / Matt Bishop p. 65-74
The filter model of information security : a conceptual model for education and training / A. R. Smith p. 75-90.
Shamir's scheme says it all / Ed Dawson ; Diane Donovan. p. 91-102.
LUC: a new public key system / Peter J. Smith ; Michael J. J. Lennon. p. 103-118.
The encapsulated security services interface (ESSI) / Ping Lin. p. 119-136
Context-dependent acess control in distributed systems / Hemann Strack ; Kwok-Yan Lam. p. 137-156.
Internal Control by objetives: the functional control matrix / Karl H. Krueger. p. 157-170.
International standards and organizational security needs: bridging the Gap / C.J. Bosch ; J.H.P. Eloff ; J.M. Carroll. p. 171-184.
The risk data repository : a novel approach to security risk modelling / A.M. Anderson ; D. Longley ; A.B. Ticke. p. 185-194.
Turning multiple evaluated products into trusted systems with asurance / D. Gambel ; J. Fowler. p. 195-206.
Historical labels in open distributed IT Systems : an ITSEC/ECMA specification / Steward Kowalski. p. 207-226.
A model for organising information security documentation / L.M. du Toit ; S.H. von Solms. p. 227-242.
Planning for the EDI of tomorrow using electronic document authorization / S. Russell. p. 243-252.
The EDP auditor: disappearing or adapting / Guy. G. Gable ; Gordon B. Davis. p. 253-266.
Electronic data interface (EDI) security and audito : a practical approach / Ivan Ekebrink p. 267-276.
A generic security platform for workstations / Björn Lindberg. p. 277-286.
Evaluation of an academic programme in IT security 1985-1990 / Louise Yngström. p. 287-300.
Figthing the viruses : practical anti-virus training / Mikael Larsson. p.301-312.
A quantitative accreditation model- assessing the value of assurance / M. Ohlin. p.313-326.
Superseding manual generation of access control specification- from policies to profiles / D. Pottas ; S. H. von Solms. p. 327-342.
Extending the ISO access framework for multiple policies / Marshall D. Abrams ; Michael V. Joyce. p. 343-358.
Evolution of IT security in India - Implementation issues / K. Subramanian. p. 359-368.
Legal response to computer crime - Retrospect of a "Mere Chance" case / Juhani Saari. p. 369-374.
Information systems security and Fraud prevention in office automation systems / Philip M. Stanley. p. 375-384.
A process approach to information security management / R. von Solms. ; S.H. von Solms ; J.M. Carroll. p. 385-400.
MRA : A computational technique for security in High-Performance systems / Mahdi Abdelguerfi ; Andrea Dunham ; Wayne Patterson. p. 401-417.
No hay comentarios para este ítem.