Normal view MARC view ISBD view

Global Security, Safety, and Sustainability [electronic resource] :5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings / edited by Hamid Jahankhani, Ali G. Hessami, Feng Hsu.

by Jahankhani, Hamid [editor.]; Hessami, Ali G [editor.]; Hsu, Feng [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Communications in Computer and Information Science: 45Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.Description: online resource.ISBN: 9783642040627.Subject(s): Computer science | Computer network architectures | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Biometrics | Computer Science | Data Structures, Cryptology and Information Theory | Computers and Society | Computer Systems Organization and Communication Networks | Data Encryption | Biometrics | Systems and Data SecurityDDC classification: 005.74 Online resources: Click here to access online
Contents:
Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush! -- A Security Audit Framework for Security Management in the Enterprise -- Watermarking Spatial Data in Geographic Information Systems -- Situation Awareness in Systems of Systems Ad-Hoc Environments -- The Georgia’s Cyberwar -- The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture -- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions -- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust -- A Systems Framework for Sustainability -- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path -- Geofencing in a Security Strategy Model -- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions -- The Significance of Security in Transmitting Clinical Data -- Security Concern over Earth Viewer Software Using Satellite Photo Service -- The People’s Republic of China – The Emerging Cyberpower -- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation -- Neural Networks for Intrusion Detection Systems -- Exploitation of Secrets Injected in Java Midlets -- Biometrically Based Electronic Signatures for a Public Networked Environment -- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain -- The Kido Botnet: Back to the Future -- Information Systems Security and Its Affiliation to Information Technology Risk Management -- A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea -- Hey – Get Off My Cloud! -- Static and Dynamic Analysis for Web Security in Generic Format.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 5th International Conference, ICGS3, held in London, UK, in September 2009. The 28 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from many submissions. The two days conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)

Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush! -- A Security Audit Framework for Security Management in the Enterprise -- Watermarking Spatial Data in Geographic Information Systems -- Situation Awareness in Systems of Systems Ad-Hoc Environments -- The Georgia’s Cyberwar -- The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture -- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions -- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust -- A Systems Framework for Sustainability -- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path -- Geofencing in a Security Strategy Model -- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions -- The Significance of Security in Transmitting Clinical Data -- Security Concern over Earth Viewer Software Using Satellite Photo Service -- The People’s Republic of China – The Emerging Cyberpower -- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation -- Neural Networks for Intrusion Detection Systems -- Exploitation of Secrets Injected in Java Midlets -- Biometrically Based Electronic Signatures for a Public Networked Environment -- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain -- The Kido Botnet: Back to the Future -- Information Systems Security and Its Affiliation to Information Technology Risk Management -- A Sustainable Approach to Healing the World for Humanity and the Environment ... An Evolving Idea -- Hey – Get Off My Cloud! -- Static and Dynamic Analysis for Web Security in Generic Format.

This book constitutes the refereed proceedings of the 5th International Conference, ICGS3, held in London, UK, in September 2009. The 28 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from many submissions. The two days conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha