Showing 1 - 10 of 406
information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from … covers research and development results of lasting significance in the theory, design, implementation, analysis, and … -- 5. Policy-based access control for context-aware services over the wireless Internet / Paolo Bellavista, Antonio Corradi …
Persistent link: https://www.econbiz.de/10011725793
compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan … / Md Delwar Hussain Mahdi and Karim Mohammed Rezaul -- 21. Safeguarding Australia from cyber-terrorism: a SCADA risk …
Persistent link: https://www.econbiz.de/10011727317
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security … framework for decision making -- 4. Security, anonymity, and privacy -- 5. Software standards, reliability, safety, and risk … policies and risk analysis -- 9. Security analysis, assessment, and assurance -- 10. Access control, authentication, and …
Persistent link: https://www.econbiz.de/10011726540
, Abdelmalek Amine -- Applying game theory in securing wireless sensor networks by minimizing battery usage / Mehran Asadi, Afrand …
Persistent link: https://www.econbiz.de/10011727900
. E-Risk Insurance Product Design: A Copula Based Bayesian Belief Network Model -- 5. E-Commerce Security and Honesty … Overcome the Password's Contradiction -- 25. Formal Analysis of Security in Interactive Systems -- 26. Internet Crime: How …
Persistent link: https://www.econbiz.de/10011729017
"This book targets business managers, IT managers, business students and researchers and will enable its readers to systematically, effectively and consistently measure the value of Information Technology"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726426
understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to … Krishna Rao, Kenneth Khit -- XVIII. Propagation and delegation of rights in access controls and risk assessment techniques …, Alfredo Terzoli, G. Radha Krishna Rao -- XX. An approach for intentional modeling of web services security risk assessment …
Persistent link: https://www.econbiz.de/10011726700
physical, social, or mental activities that humans engage in interacting with the Internet and that can be objectively observed …
Persistent link: https://www.econbiz.de/10011727360
the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin …41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / André Årnes …
Persistent link: https://www.econbiz.de/10011725950
Part I. State of the art -- 1. Security Risk Assessment and Electronic Commerce : A Cross-Industry Analysis -- 2 …. Securing the Internet in New Zealand: Threats and Solutions -- …Part II. Managing intranet and internet security -- 3. Developing Trust for Electronic Commerce -- 4. Managing Security …
Persistent link: https://www.econbiz.de/10011726332