Internet and intranet security management risks and solutions /

In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of ou...

Full description

Bibliographic Details
Main Author: Janczewski, Lech, 1943-
Corporate Author: IGI Global.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2000.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 03235nam a2200481 a 4500
001 29952
003 IGIG
005 20100714155824.0
006 m e d
007 cr |||||||||||
008 100626s2000 pau fsb 001 0 eng d
010 # # |z 00022538 
020 # # |a 9781930708624 (PDF) 
020 # # |z 1878289713 (hardback) 
020 # # |z 9781878289711 (hardback) 
024 7 # |a 10.4018/978-1-87828-971-1  |2 doi 
035 # # |a (CaBNVSL)gtp00541773 
035 # # |a (OCoLC)707611946 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a TK5105.875.I57  |b J358 2000e 
082 0 4 |a 005.8  |2 21 
100 1 # |a Janczewski, Lech,  |d 1943- 
245 1 0 |a Internet and intranet security management  |b risks and solutions /  |c Lech Janczewski.  |h [electronic resource] : 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c 2000. 
300 # # |a electronic texts (302 p.) :  |b digital files. 
504 # # |a Includes bibliographical references and index. 
505 0 # |a Part I. State of the art -- 1. Security Risk Assessment and Electronic Commerce : A Cross-Industry Analysis -- 2. Securing the Internet in New Zealand: Threats and Solutions -- 
505 0 # |a Part II. Managing intranet and internet security -- 3. Developing Trust for Electronic Commerce -- 4. Managing Security Functions Using Security Standards -- 5. Managing Security in the World Wide Web: Architecture, Services and Techniques -- 
505 0 # |a Part III. Cryptography and technical security standards -- 6. Cryptography: Protecting Confidentiality, Integrity and Availability of Data -- 7. Foundations for Cryptography -- 8. Developments in Security Mechanism Standards -- 
505 0 # |a Part IV. Security and the law -- 9. Electronic Mail, Employee Privacy and the Workplace -- 10. Protecting Personal Privacy in Cyberspace: The Limitations of Third Generation Data Protection Laws Such as the New Zealand Privacy Act 1993 -- About the Authors -- Index. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of our business and private lives. This book addresses issues of information security from the managerial, global point of view. The global approach allows us to concentrate on issues that could be influenced by activities happening on opposite sides of the globe. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on June 26, 2010). 
650 # 0 |a Internet  |x Security measures. 
650 # 0 |a Intranets (Computer networks)  |x Security measures. 
650 # 0 |a Computers  |x Access control. 
650 # 0 |a Cryptography. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 00022538  |z 9781878289711  |z 1878289713 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-87828-971-1  |z View fulltext via EzAccess