The 41 papers collected in this volume reflect the growing importance of security in computer and telecommunications systems. The creation and study of security systems has firmly entered the mainstream of Computer Science and Computer Systems Engineering in academic, educational and industrial research organisations. Research into computer architecture, operating systems, data base management systems, data communications protocols, standards, human interfaces and numerous other areas has been affected by the growing requirements for sufficiently developed security measures. Governmental responses to the problems of personal privacy, computer related criminal activity etc., have likewise been growing over the last two to three years and appear set to increase markedly in the near future.
The 41 papers collected in this volume reflect the growing importance of security in computer and telecommunications systems. The creation and study of security systems has firmly entered the mainstream of Computer Science and Computer Systems Engineering in academic, educational and industrial research organisations. Research into computer architecture, operating systems, data base management systems, data communications protocols, standards, human interfaces and numerous other areas has been affected by the growing requirements for sufficiently developed security measures. Governmental responses to the problems of personal privacy, computer related criminal activity etc., have likewise been growing over the last two to three years and appear set to increase markedly in the near future.
Sprache
Verlagsort
Verlagsgruppe
Elsevier Science & Technology
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Maße
ISBN-13
978-0-444-88324-7 (9780444883247)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
Cryptographic Systems - I. Secure Data Bases. EFTS and Banking. Cryptographic Systems - II. Organisations and Education. Computer Crime. Cryptographic Systems - III. Office Automation. Security Products and Systems. Crypto-Key Systems. Secure / Trusted Systems - I. Access / Authentication Control - I. Auditing - I. Secure / Trusted Systems - II. Access / Authentication Control - II. Secure / Trusted Systems - III. Document Interchange and Networks. Networks / EFT. EFTS and Cost of Security. Auditing - II. Networks, PCs and Workstations. Authentication and Identification. Index.