Return to home page
Searching: Muskingum library catalog
We are currently experiencing delivery delays for items requested from other institutions while transitioning to a new statewide delivery service. Please contact your library with questions or advice about alternative resources. Thank you for your patience!
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Author Janczewski, Lech, 1943-
Title Internet and intranet security management : risks and solutions / Lech Janczewski.
Imprint Hershey, Pa. : Idea Group Pub., 2000.

LOCATION CALL # STATUS MESSAGE
 OHIOLINK NETLIBRARY EBOOKS    ONLINE  
View online
LOCATION CALL # STATUS MESSAGE
 OHIOLINK NETLIBRARY EBOOKS    ONLINE  
View online
Author Janczewski, Lech, 1943-
Subject Internet -- Security measures.
Intranets (Computer networks) -- Security measures.
Computers -- Access control.
Cryptography.
Description 1 online resource (302 pages)
Bibliography Note Includes bibliographical references and index.
Contents State of the Art -- Security Risk Assessment and Electronic Commerce A Cross-Industry Analysis / Jonathan W. Palmer, Jamie Kliewer, Mark Sweat -- Securing the Internet in New Zealand: Threats and Solutions / Jairo A Gutierrez -- Managing Intranet and Internet Security -- Developing Trust for Electronic Commerce / Dieter Fink -- Managing Security Functions Using Security Standards / Lech Janczewski -- Managing Security in the World Wide Web: Architecture, Services and Techniques / Fredj Dridi, Gustaf Neumann -- Cryptography and Technical Security Standards -- Cryptography: Protecting Confidentiality, Integrity and Availability of Data / Henry B. Wolfe -- Foundations for Cryptography / Dieter Gollmann -- Developments in Security Mechanism Standards / Chris Mitchell -- Security and the Law -- Electronic Mail, Employee Privacy and the Workplace / Charles Prysby, Nicole Prysby -- Protecting Personal Privacy in Cyberspace: The Limitations of Third Generation Data Protection Laws Such as the New Zealand Privacy Act 1993 / Gehan Gunasekara.
Summary "Internet and Intranet Security Management: Risks and Solutions addresses issues of information security from the managerial, global point of view. The global approach allows us to concentrate on issues that could be influenced by activities happening on opposite sides of the Earth."--Jacket.
Access Use copy Restrictions unspecified star
Reproduction Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010.
System Details Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212
Note digitized 2010 HathiTrust Digital Library committed to preserve pda
Print version record.
ISBN 0585306907 (electronic bk.)
9780585306902 (electronic bk.)
1930708629
9781930708624
1878289713
9781878289711
OCLC # 45731555
Additional Format Print version: Janczewski, Lech, 1943- Internet and intranet security management. Hershey, Pa. : Idea Group Pub., 2000 1878289713 (DLC) 00022538 (OCoLC)43434725
Table of Contents
 Preface 
Pt. IState of the Art1
 Ch. 1Security Risk Assessment and Electronic Commerce: A Cross-Industry Analysis / Jonathan W. Palmer, Jamie Kliewer, Mark Sweat2
 Ch. 2Securing the Internet in New Zealand: Threats and Solutions / Jairo A. Gutierrez24
Pt. IIManaging Intranet and Internet Security38
 Ch. 3Developing Trust for Electronic Commerce / Dieter Fink39
 Ch. 4Managing Security Functions Using Security Standards / Lech Janczewski81
 Ch. 5Managing Security in the World Wide Web: Architecture, Services and Techniques / Fredj Dridi, Gustaf Neumann106
Pt. IIICryptography and Technical Security Standards140
 Ch. 6Cryptography: Protecting Confidentiality, Integrity and Availability of Data / Henry B. Wolfe141
 Ch. 7Foundations for Cryptography / Dieter Gollmann163
 Ch. 8Developments in Security Mechanism Standards / Chris Mitchell185
Pt. IVSecurity and the Law247
 Ch. 9Electronic Mail, Employee Privacy and the Workplace / Charles Prysby, Nicole Prysby251
 Ch. 10Protecting Personal Privacy in Cyberspace: The Limitations of Third Generation Data Protection Laws Such as the New Zealand Privacy Act 1993 / Gehan Gunasekara271
 About the Authors296
 Index300



If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team