Compsec 1994

Compsec 1994 : Proceedings of the 11th World Conference on Computer Security, Audit and Control, London, October 12-14 1994

List price: US$211.00

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

The full proceedings from the premier intemational computer security event. Attracting renowned speakers from all over the world, COMPSEC International remains established as the leading international forum providing solutions for today's computer security problems. AUDIENCE For all those interested in computer security.show more

Product details

  • Paperback | 480 pages
  • 215.9 x 304.8 x 25.4mm
  • ELSEVIER SCIENCE & TECHNOLOGY
  • Elsevier Advanced Technology
  • Oxford, United Kingdom
  • English
  • 1856172430
  • 9781856172431

Table of contents

Keynote. 1994 security breaches survey (C. Hook). Management Issues. Making security pay (M. Smith). Duress terminations and information security (C. Cresson Wood ). Understanding backups: a business perspective (J. Maynard). A benchmarking approach to user security (D. Davies). The Virus Threat. Virus control on networks: solving the insoluble (J. Hruska). Cost effectiveness of anti-viral software (B. Zajac ). Telecommunications. Computer related offenses in a telecommunications environment (T Mulhall). Financial Systems. EDI security (T. Dosdale). Evaluations for financial security systems (E. Bovelander ). Legislation / Standards. A critique of security standards (T Lilleywhite). European IT security legislation (J. Worthy). Network Security. Secure connections to the Internet (B. Neal). 50 ways to secure dial-up connections (C. Cresson Wood). Comprehensive LAN security with minimum effort (P Wood). Use of network design to reduce security risks (L. Hansen). New Technology. Where biometrics are today? (B. Carter). Trends & directions in smart card security (N. McEvoy). Encryption. Crypto security tools and algorithms (C. Meyer). Digital signatures and their uses (M. Ganley). Disaster Recovery. Countering the bomb threat (R. Incenance). The emergency help desk (B. Doswell). Directors Briefing - Profit Multipliers / Profit Reducers. The real cost of IT (J. Edler). Open Systems Security. Security in the client / server environment (J. Sherwood). Database security (D. Harris, D. Sidwell). Systems / Application Specific. Lotus notes security, a contradiction in terms (K. Lindup). An introduction to MVS integrity concerns (N. Crocker ). Open VMS security (T. Pitt). Industrial Espionage. Online industrial espionage (W. Madsen). Industrial espionage: analysing the risk (P. Sommer). Hacking. Hacking: tricks of the trade (R. Schifreen ). The cyperpunk age (K. Lindup). Audit Stream. Auditing, IT effectiveness (P Williams ). Auditing the procurement of end user computing resources (S. Blackburn). PC's as a power tool for efficiency (M. Wotton ). Security in distributed & client server systems - a management view (I. Symonds). (Part contents)show more