Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Boston
Kluwer Acad. Publ.
2002
|
Schriftenreihe: | International Federation for Information Processing
86 |
Schlagworte: | |
Online-Zugang: | Table of contents Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV014411409 | ||
003 | DE-604 | ||
005 | 20030303 | ||
007 | t| | ||
008 | 020603s2002 xxua||| |||| 10||| eng d | ||
010 | |a 2002023690 | ||
020 | |a 1402070306 |9 1-4020-7030-6 | ||
035 | |a (OCoLC)49285534 | ||
035 | |a (DE-599)BVBBV014411409 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
111 | 2 | |a IFIP TC11 International Conference on Information Security |n 17 |d 2002 |c Kairo |j Verfasser |0 (DE-588)16138941-7 |4 aut | |
245 | 1 | 0 | |a Security in the information society |b visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt |c ed. by M. Adeeb Ghonaimy ... |
264 | 1 | |a Boston |b Kluwer Acad. Publ. |c 2002 | |
300 | |a XII, 586 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a International Federation for Information Processing |v 86 | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Protection de l'information (Informatique) - Coopération internationale - Congrès | |
650 | 4 | |a Sécurité informatique - Coopération internationale - Congrès | |
650 | 4 | |a Computer security |x International cooperation |v Congresses | |
650 | 4 | |a Data protection |x International cooperation |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2002 |z Kairo |2 gnd-content | |
689 | 0 | 0 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ghonaimy, M. A. R. |e Sonstige |4 oth | |
830 | 0 | |a International Federation for Information Processing |v 86 |w (DE-604)BV012919129 |9 86 | |
856 | 4 | |u http://www.loc.gov/catdir/toc/fy031/2002023690.html |3 Table of contents | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009856475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009856475 |
Datensatz im Suchindex
_version_ | 1819664749139329024 |
---|---|
adam_text | SECURITY IN THE INFORMATION SOCIETY VISIONS AND PERSPECTIVES IFIP TC11
17 TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY (SEC2002) MAY
7-9, 2002, CAIRO, EGYPT EDITED BY M. ADEEB GHONAIMY AIN SHAMS UNIVERSITY
EGYPT MAHMOUD T. EL-HADIDI CAIRO UNIVERSITY EGYPT HEBA K. ASIAN
ELECTRONIC RESEARCH INSTITUTE EGYPT . , * , , *. * * * * , * . . - , -
. A PUBLISHERS CONTENTS PREFACE IX IFIP/SEC2002 CONFERENCE COMMITTEES XI
PART ONE INFORMATION SECURITY MANAGEMENT 1. THE EFFECTIVE IMPLEMENTATION
OF INFORMATION SECURITY IN ORGANIZATIONS O.A. HOPPE.J. VANNIEKERK, ANDR.
VON SOLMS. 1 2. A PRACTICAL APPROACH TO INFORMATION SECURITY AWARENESS
IN THE ORGANIZATION C. VROOM, ANDR. VON SOLMS 19 3. RBAC POLICIES IN XML
FOR X.509 BASED PRIVILEGE MANAGEMENT D.W. CHADWICK, AND A. OTENKO 3 9 4.
A TOP-DOWN APPROACH TOWARDS TRANSLATING ORGANIZATIONAL SECURITY POLICY
DIRECTIVES TO SYSTEM AUDIT CONFIGURATION A. AHMAD, AND T. RUIGHAVER 55
5. ELABORATING QUANTITATIVE APPROACHES FOR IT SECURITY EVALUATION D.
GRITZALIS, M. KARYDA,.ANDL.GYMNOPOULOS. 67 PART TWO STANDARDS OF
INFORMATION SECURITY 6. A SECURITY EVALUATION CRITERIA FOR BASELINE
SECURITY STANDARDS W.J. BROOKS, M. WARREN, AND W. HUTCHINSON. 79 7.
MATURITY CRITERIA FOR DEVELOPING SECURE IS AND SW: LIMITS, AND PROSPECTS
M.T.SIPONEN 91 8. FOR A SECURE MOBILE IP AND MOBILE IPV6 DEPLOYMENT M.
LAURENT-MAKNAVICIUS 109 PART THREE THREATS AND ATTACKS TO INFORMATION 9.
ADDRESSING INTERNET SECURITY VULNERABILITIES: A BENCHMARKING STUDY A.
ALAYED, S.M. FURNELL ANDI.M. BARLOW 121 10. THE THREAT FROM WITHIN - AN
ANALYSIS OF ATTACKS ON AN INTERNAL NETWORK J. HAGGERTY, Q. SHI, AND M.
MERABTI 133 VI CONTENTS 11. SECURITY VULNERABILITIES IN EVENT-DRIVEN
SYSTEMS S. XENITELLIS 147 12. DENIAL OF SERVICE: ANOTHER EXAMPLE J.J.
YAN 16 1 13. A DETECTION SCHEME FOR THE SK VIRUS D. SALAH, H.K. ASLAN,
ANDM.T. EL-HADIDI 171 PART FOUR EDUCATION AND CURRICULUM FOR INFORMATION
SECURITY 14. AN INFORMATION SECURITY CURRICULUM IN FINLAND T. VIRTANEN,
AND R. ADDAMS-MORING 183 PART FIVE SOCIAL AND ETHICAL ASPECTS OF
INFORMATION SECURITY 15. INFORMATION SECURITY CULTURE: THE
SOCIO-CULTURAL DIMENSION IN INFORMATION SECURITY MANAGEMENT T.
SCHLIENGER, AND S. TEUFEL 191 16. INFORMATION SECURITY CULTURE A.
MARTINS, ANDJ. ELOFF 203 PART SIX INFORMATION SECURITY SERVICES 17.
KEYSTROKE ANALYSIS AS A METHOD OF ADVANCED USER AUTHENTICATION AND
RESPONSE P.S. DOWLAND, S.M. FURNELL, ANDM. PAPADAKI. 215 18. ZERO
KNOWLEDGE BROADCASTING IDENTIFICATION SCHEME M.S. EL-SOUDANI, H.S.
EL-REFAEY, ANDH.M. MOURAD 227 19. A NEW END-TO-END AUTHENTICATION
PROTOCOL FOR MOBILE USERS TO ACCESS INTERNET SERVICES LI-SHA HE, N.
ZHANG, LI-RONG HE 239 20. MANDATORY SECURITY POLICIES FOR CORBA SECURITY
MODEL CM. WESTPHALL, J. DA S. FRAGA, C.B. WESTPHALL, AND S.C.S. BIANCHI
251 21. POLICAP-PROPOSAL, DEVELOPMENT AND EVALUATION OF A POLICY SERVICE
AND CAPABILITIES FOR CORBA SECURITY CM. WESTPHALL, J. DA S FRAGA, M.S.
WANGHAM, R.R. OBELHEIRO, ANDL.C. LUNG 263 22. SECURE DATABASE
CONNECTIVITY ON THE WWW M. COETZEE, ANDJ. ELOFF. 275 23. TOWARDS
SEMANTIC INTEGRITY IN RATIONAL DATABASE R.A. BOTHA 287 24. FORMAL DESIGN
OF PACKET FILTERING SYSTEMS G. OSMAN, M.G. DARWISH, ANDM. ZAKI 299 25.
ELLIPTIC CURVE CRYPTOSYSTEMS ON SMART CARDS E. MOHAMMED, A. EMARAH,
ANDKH. EL-SHENNAWY 311 SECURITY IN THE INFORMATION SOCIETY: VISIONS AND
PERSPECTIVES VII PART SEVEN MULTILATERAL SECURITY 26. ESTABLISHING
BILATERAL ANONYMOUS COMMUNICATION IN OPEN NETWORKS T.DEMUTH 323 PART
EIGHT APPLICATIONS OF INFORMATION SECURITY 27. BRITS-A HOLISTIC
FRAMEWORK FOR HEDGING SHAREHOLDER VALUE IN IT DEPENDENT BUSINESS C.
MAGNUSSON, ANDL. YNGSTROM. 335 28. INFORMATION SYSTEMS SECURITY AND THE
INFORMATION SYSTEMS DEVELOPMENT PROJECT: TOWARDS A FRAMEWORK FOR THEIR
INTEGRATION T. TRYFONAS, AND E. KIOUNTOUZIS 347 29. AN EFFICIENT HYBRID
SEALED BID AUCTION PROTOCOL R. ABDEL-MONEIM, S. EL-KASSAS, AND H. HOSNY.
357 30. SELF-DETERMINATION IN MOBILE INTERNET: PIMI PROTOTYPE RESULTS S.
FISCHER-HUBNER, M. NILSSON AND H. LINDSKOG 37 3 31. SECURE COMPONENT
DISTRIBUTION USING WEBCOM S.N. FOLEY, T.B. QUILLINAN, ANDJ.P. MORRISON.
387 32. E-TICKET ISSUING SYSTEM WITH 3-D PATTERN RECOGNITION FOR MOBILE
TERMINALS R. UDA, M. ITO, K. AW AY A, H. SHIGENO, AND Y. MATSUSHITA 399
33. AN INSIGHT INTO USER PRIVACY AND ACCOUNTABLE ANONYMITY FOR MOBILE
E-COMMERCE TRANSACTIONS D. CRITCHLOW, AND N. ZHANG 411 PART NINE
INFRASTRUCTURE FOR INFORMATION SECURITY 34. SECURE SELECTIVE EXCLUSION
IN AD HOC WIRELESS NETWORK R.O. DIPIETRO, L. V. MANCINI, ANDS. JAJODIA
423 PART TEN ADVANCED TOPICS IN SECURITY 35. OPTICAL NETWORK MODELS FOR
QUANTUM CRYPTOGRAPHY S.T. FARAJ, F. AL-NAIMA, ANDS.Y. AMEEN 435 PART
ELEVEN LEGISLATION FOR INFORMATION SECURITY 36. A UNIFIED REGULATORY
FRAMEWORK ON A EUROPEAN INFORMATION SOCIETY: SUGGESTED BUILDING LEVELS
P.S. ANASTASIADES 453 37. REVISITING LEGAL AND REGULATORY REQUIREMENTS
FOR SECURE E-VOTING L. MITROU, D. GRITZALIS, AND S. KATSIKAS 469 VIII
CONTENTS PART TWELVE MODELING AND ANALYSIS FOR INFORMATION SECURITY 38.
A SECURITY INCIDENT DATA MODEL M.A.BELSIS, N. GODWIN, ANDL. SMALOV 481
39. SECURITY LEVELS FOR CONTRACTING AGENTS A. MEIER, ANDS. ROHRIG 495
40. FUNCTIONAL REQUIREMENTS FOR A SECURE ELECTRONIC VOTING SYSTEM S.
IKONOMOPOULOS, C. LAMBRINOUDAKIS, D. GRITZALIS, S. KOKOLAKIS, ANDK.
VASSILIOU. 507 41. INTELLIGENT IP PACKET FILTERING M. HASHEM, A.
MOHAMED, ANDM. WAHIB 521 PART THIRTEEN TOOLS FOR INFORMATION SECURITY
42. HUMAN COMPUTER INTERACTION: AN INFORMATION SECURITY PERSPECTIVES MM.
ELOFF, ANDJ.H.P. ELOFF 535 43. A VERY SMART CARD FOR FIGHTING AGAINST
TERRORISM J.GENESTE 547 44. SHEDEL - A SIMPLE HIERARCHICAL EVENT
DESCRIPTION LANGUAGE FOR SPECIFYING ATTACK SIGNATURES M. MEIER,
N.BISCHOF, AND T.HOLZ 559 45. PROPAGATING MODIFICATIONS TO MOBILE
POLICIES K. SMITH, D. FAATZ, A. FAYAD, AND S. JAJODIA 573 AUTHOR INDEX
585
|
any_adam_object | 1 |
author_corporate | IFIP TC11 International Conference on Information Security Kairo |
author_corporate_role | aut |
author_facet | IFIP TC11 International Conference on Information Security Kairo |
author_sort | IFIP TC11 International Conference on Information Security Kairo |
building | Verbundindex |
bvnumber | BV014411409 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)49285534 (DE-599)BVBBV014411409 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02346nam a2200493zcb4500</leader><controlfield tag="001">BV014411409</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030303 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">020603s2002 xxua||| |||| 10||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2002023690</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1402070306</subfield><subfield code="9">1-4020-7030-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)49285534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014411409</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">IFIP TC11 International Conference on Information Security</subfield><subfield code="n">17</subfield><subfield code="d">2002</subfield><subfield code="c">Kairo</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)16138941-7</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in the information society</subfield><subfield code="b">visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt</subfield><subfield code="c">ed. by M. Adeeb Ghonaimy ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Kluwer Acad. Publ.</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 586 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">International Federation for Information Processing</subfield><subfield code="v">86</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique) - Coopération internationale - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Coopération internationale - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">International cooperation</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">International cooperation</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2002</subfield><subfield code="z">Kairo</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghonaimy, M. A. R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">International Federation for Information Processing</subfield><subfield code="v">86</subfield><subfield code="w">(DE-604)BV012919129</subfield><subfield code="9">86</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/fy031/2002023690.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009856475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009856475</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2002 Kairo gnd-content |
genre_facet | Konferenzschrift 2002 Kairo |
id | DE-604.BV014411409 |
illustrated | Illustrated |
indexdate | 2024-12-23T15:56:22Z |
institution | BVB |
institution_GND | (DE-588)16138941-7 |
isbn | 1402070306 |
language | English |
lccn | 2002023690 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009856475 |
oclc_num | 49285534 |
open_access_boolean | |
physical | XII, 586 S. Ill. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Kluwer Acad. Publ. |
record_format | marc |
series | International Federation for Information Processing |
series2 | International Federation for Information Processing |
spellingShingle | Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt International Federation for Information Processing Protection de l'information (Informatique) - Coopération internationale - Congrès Sécurité informatique - Coopération internationale - Congrès Computer security International cooperation Congresses Data protection International cooperation Congresses Datensicherung (DE-588)4011144-1 gnd Informationsgesellschaft (DE-588)4114011-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4114011-4 (DE-588)1071861417 |
title | Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt |
title_auth | Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt |
title_exact_search | Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt |
title_full | Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt ed. by M. Adeeb Ghonaimy ... |
title_fullStr | Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt ed. by M. Adeeb Ghonaimy ... |
title_full_unstemmed | Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt ed. by M. Adeeb Ghonaimy ... |
title_short | Security in the information society |
title_sort | security in the information society visions and perspectives ifip tc11 17th international conference on information security sec2002 may 7 9 2002 cairo egypt |
title_sub | visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt |
topic | Protection de l'information (Informatique) - Coopération internationale - Congrès Sécurité informatique - Coopération internationale - Congrès Computer security International cooperation Congresses Data protection International cooperation Congresses Datensicherung (DE-588)4011144-1 gnd Informationsgesellschaft (DE-588)4114011-4 gnd |
topic_facet | Protection de l'information (Informatique) - Coopération internationale - Congrès Sécurité informatique - Coopération internationale - Congrès Computer security International cooperation Congresses Data protection International cooperation Congresses Datensicherung Informationsgesellschaft Konferenzschrift 2002 Kairo |
url | http://www.loc.gov/catdir/toc/fy031/2002023690.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009856475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV012919129 |
work_keys_str_mv | AT ifiptc11internationalconferenceoninformationsecuritykairo securityintheinformationsocietyvisionsandperspectivesifiptc1117thinternationalconferenceoninformationsecuritysec2002may792002cairoegypt AT ghonaimymar securityintheinformationsocietyvisionsandperspectivesifiptc1117thinternationalconferenceoninformationsecuritysec2002may792002cairoegypt |