Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: Compsec International London (VerfasserIn)
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Oxford Elsevier 1994
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV010536646
003 DE-604
005 19960212
007 t
008 951221s1994 ad|| |||| 10||| eng d
020 |a 1856172430  |9 1-85617-243-0 
035 |a (OCoLC)31937279 
035 |a (DE-599)BVBBV010536646 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-91G 
050 0 |a QA76.9.A25 
082 0 |a 005.8  |2 20 
084 |a DAT 050f  |2 stub 
084 |a DAT 460f  |2 stub 
111 2 |a Compsec International  |n 11  |d 1994  |c London  |j Verfasser  |0 (DE-588)5163899-X  |4 aut 
245 1 0 |a Proceedings of COMPSEC International 1994  |b Westminster, London, UK, 12 - 14 October 1994 
264 1 |a Oxford  |b Elsevier  |c 1994 
300 |a V, 479 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 4 |a Computers - Security 
650 4 |a Informatique - Vérification comptable - Congrès 
650 4 |a Ordinateurs - Accès - Contrôle - Congrès 
650 4 |a Sécurité informatique - Congrès 
650 4 |a Datenverarbeitung 
650 4 |a Computer security  |v Congresses 
650 4 |a Computers  |x Access control  |v Congresses 
650 4 |a Electronic data processing  |x Auditing  |v Congresses 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
856 4 2 |m Digitalisierung TU Muenchen  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007023767&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
999 |a oai:aleph.bib-bvb.de:BVB01-007023767 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102/DAT 050f 2001 B 3044
DE-BY-TUM_katkey 666933
DE-BY-TUM_local_keycode ko
DE-BY-TUM_media_number 040020000373
_version_ 1816711724124864512
adam_text CONTENTS DAY 1 KEYNOTE The 1994 IT Security Breaches Survey ................................1 Chris Hook STREAM 1 — Management Issues Making Security Pay .........................................8 Martin Smith Duress Terminations and Information Security ........................... 14 Charles Cresson Wood Understanding the Backups — a Business Perspective ...................... 23 JeffMaynard A Benchmarking Approach to User Security ............................ 29 David Davies Integrity in Information Systems .................................. 36 William List STREAM 2 — Virus/Telecommunications Virus Control on Networks: Solving the Unsolvable ........................ 47 Jan Hruška Cost Effectiveness of Anti-Viral Scanners ............................. 53 Bernard P. Zajac, Jr. Computer Related Offences in a Telecommunications Environment ................ 77 Tom Muhall STREAM 3 — Financial/Legislation EDI Security ............................................. 85 Terry Dosdale Evaluations for Financial Security Systems ............................. 93 Ernst Bovelander A Critique of IT Security Standards and Their Role in the Management of Risk ..........108 Thomas P. Lillywhite European IT Security Legislation ..................................114 John Worthy STREAM 4 - EDP Audit Auditing IT Effectiveness ......................................124 Paul Williams III DAY 2 STREAM 1 — Network Security Secure Connections to the Internet .................................132 Brian Neale Fifty Ways to Secure Dial-up Connections .............................142 Charles Cresson Wood Comprehensive LAN Security with Minimum Effort .........................149 Peter Wood Use of Network Design to Reduce Security Risks .........................171 Lesley Hansen STREAM 2 — Technology/Encryption Where Biometrics are Today ....................................177 Bob Carter Trends in Smart Card Security ...................................184 Neil A McEvoy Crypto Security Tools and Algorithms For Closed & Open Systems ............... 190 Carl H. Meyer Digital Signatures and Their Uses .................................212 Michaeli Ganley STREAM 3 — Disaster Recovery Countering the Bomb Threat ....................................223 Rob Ince The Emergency Help Desk .....................................235 Brian Doswell DIRECTORS BRIEFING The Real Cost of Information Technology ..............................241 John Edler STREAM 4 - EDP Audit Auditing the Purchase of End User Computing Resources .....................247 Sarah Blackburn PCs as a Power Tool for Efficiency .................................255 Malcolm Wotton Security in Distributed and Client-Server Systems — A Management View ............262 Ian M. Symonds Fault Tolerant Auditing ........ 271 EdHutt Benchmarking ............................................ 303 Gerry Penfold IV DAY 3 STREAM 1 — Open Systems Security Security in the Client-Server Environment .............................310 John Sherwood and Jon Fitzgerald Distributed Database Security ...................................320 Duncan Harris and David Sidwell STREAM 2— System/Application Specific Lotus Notes Security — A Contradiction in Terms .........................336 Ken Lindup and Ashim Pal An Introduction to MVS Integrity Concerns .............................364 Norman Crocker Open VMS Security .........................................375 Tony Pitt STREAM 3 — Industrial Espionage/Hacking On-line Industrial Espionage ....................................380 WayneMadsen Industrial Espionage: Analyzing the Risk ..............................389 Peter Sommer Hacking: Tricks of the Trade ....................................400 Robert Shifreen The Cyberpunk Age .........................................404 Ken Lindup STREAM 4 - EDP Audit Document Security — An Awareness ................................431 Julie Hollins Expert Evidence and the Expert Witness ..............................454 J.J.P. Kenny Promoting Computer Security Through Positive Computer Audit ..................463 Gary Hardy CLOSING ADDRESS The Clipper Controversy ......................................473 WayneMadsen
any_adam_object 1
author_corporate Compsec International London
author_corporate_role aut
author_facet Compsec International London
author_sort Compsec International London
building Verbundindex
bvnumber BV010536646
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_tum DAT 050f
DAT 460f
ctrlnum (OCoLC)31937279
(DE-599)BVBBV010536646
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01631nam a2200421 c 4500</leader><controlfield tag="001">BV010536646</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19960212 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">951221s1994 ad|| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1856172430</subfield><subfield code="9">1-85617-243-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)31937279</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV010536646</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Compsec International</subfield><subfield code="n">11</subfield><subfield code="d">1994</subfield><subfield code="c">London</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)5163899-X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of COMPSEC International 1994</subfield><subfield code="b">Westminster, London, UK, 12 - 14 October 1994</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Elsevier</subfield><subfield code="c">1994</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">V, 479 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers - Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique - Vérification comptable - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Auditing</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=007023767&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007023767</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV010536646
illustrated Illustrated
indexdate 2024-11-25T17:14:19Z
institution BVB
institution_GND (DE-588)5163899-X
isbn 1856172430
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-007023767
oclc_num 31937279
open_access_boolean
owner DE-91G
DE-BY-TUM
owner_facet DE-91G
DE-BY-TUM
physical V, 479 S. Ill., graph. Darst.
publishDate 1994
publishDateSearch 1994
publishDateSort 1994
publisher Elsevier
record_format marc
spellingShingle Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994
Computers - Security
Informatique - Vérification comptable - Congrès
Ordinateurs - Accès - Contrôle - Congrès
Sécurité informatique - Congrès
Datenverarbeitung
Computer security Congresses
Computers Access control Congresses
Electronic data processing Auditing Congresses
subject_GND (DE-588)1071861417
title Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994
title_auth Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994
title_exact_search Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994
title_full Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994
title_fullStr Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994
title_full_unstemmed Proceedings of COMPSEC International 1994 Westminster, London, UK, 12 - 14 October 1994
title_short Proceedings of COMPSEC International 1994
title_sort proceedings of compsec international 1994 westminster london uk 12 14 october 1994
title_sub Westminster, London, UK, 12 - 14 October 1994
topic Computers - Security
Informatique - Vérification comptable - Congrès
Ordinateurs - Accès - Contrôle - Congrès
Sécurité informatique - Congrès
Datenverarbeitung
Computer security Congresses
Computers Access control Congresses
Electronic data processing Auditing Congresses
topic_facet Computers - Security
Informatique - Vérification comptable - Congrès
Ordinateurs - Accès - Contrôle - Congrès
Sécurité informatique - Congrès
Datenverarbeitung
Computer security Congresses
Computers Access control Congresses
Electronic data processing Auditing Congresses
Konferenzschrift
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007023767&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT compsecinternationallondon proceedingsofcompsecinternational1994westminsterlondonuk1214october1994