maanantaina, tammikuuta 12, 2009
A comprehensive new book on information security
- Basics of security concepts, services, and threats
- Models for quality of the business integrated information security management
- Principles of user authentication technologies
- Principles of authorization and access control and their applications
- Security of data-centric applications
- Principles of modern cryptology and new research challenges in this field
- Network security and its dynamics
- Public key and privilege management infrastructures
- Architectural and functional characteristics of smart cards and similar tokens
- Privacy issues and privacy-enhancing technologies from legal and technical perspectives
- Legal and technical issues relating to secure content-filtering technologies
- A model for cybercrime investigations for forensic examination and presentation
- Systemic-holistic approach to IT security with subjective details based on objective knowledge
- Secure electronic voting systems using cryptology models and protocols
- Requirements and architecture for mobile wiki systems security
Chapter 3 in the book (pages 21 ... 34) on “Business-integrated information security management” was made by Juhani Anttila, Jorma Kajava, Rauno Varonen and Gerald Quirchmayr.
This topic has also been considered in Finnish and in English in two previous blog posts: #1 and #2
Tämän blogin aineistojen
käyttöoikeutta koskee
Creative Commons
lähde mainittava 3.0 -lisenssi.
Lähetä kommentti