National Computer Security Conference Proceedings, 1992

National Computer Security Conference Proceedings, 1992
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Total Pages: 416
Release: 1992-11
Genre:
ISBN: 9780788102219


Download National Computer Security Conference Proceedings, 1992 Book in PDF, Epub and Kindle

Held October 13-16, 1992. Emphasizes information systems security criteria (& how it affects us), and the actions associated with organizational accreditation. These areas are highlighted by emphasizing how organizations are integrating information security solutions. Includes presentations from government, industry and academia and how they are cooperating to extend the state-of-the-art technology to information systems security. 72 referred papers, trusted systems tutorial and 23 executive summaries. Very valuable! Must buy!

Information Highways for a Smaller World and Better Living

Information Highways for a Smaller World and Better Living
Author: Seon Jong Chung
Publisher: IOS Press
Total Pages: 924
Release: 1996
Genre: Computer networks
ISBN: 9051992408


Download Information Highways for a Smaller World and Better Living Book in PDF, Epub and Kindle

This work discusses the issues among people creating computer communication technology, the people using computer communication, the people impacted by it, and the regulators responsible for balancing the interest of these multiple groups.

National Computer Security Conference, 1993 (16th) Proceedings

National Computer Security Conference, 1993 (16th) Proceedings
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Total Pages: 568
Release: 1995-08
Genre:
ISBN: 9780788119248


Download National Computer Security Conference, 1993 (16th) Proceedings Book in PDF, Epub and Kindle

Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.