Security Enhanced Applications for Information Systems
Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the...
Saved in:
Other Authors: | |
---|---|
Format: | Book Chapter |
Published: |
IntechOpen
2012
|
Subjects: | |
Online Access: | Get Fullteks DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01967naaaa2200289uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_66111 | ||
005 | 20210420 | ||
020 | |a 2345 | ||
020 | |a 9789535106432 | ||
020 | |a 9789535156314 | ||
024 | 7 | |a 10.5772/2345 |c doi | |
041 | 0 | |a English | |
042 | |a dc | ||
072 | 7 | |a GPFC |2 bicssc | |
100 | 1 | |a Kalloniatis, Christos |4 edt | |
700 | 1 | |a Kalloniatis, Christos |4 oth | |
245 | 1 | 0 | |a Security Enhanced Applications for Information Systems |
260 | |b IntechOpen |c 2012 | ||
300 | |a 1 electronic resource (236 p.) | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the reputation of the system's stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled "Security Enhanced Applications for Information Systems" and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Cybernetics & systems theory |2 bicssc | |
653 | |a Cybernetics & systems theory | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/1923/authors_book/authors_book.pdf |7 0 |z Get Fullteks |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/66111 |7 0 |z DOAB: description of the publication |