Security Enhanced Applications for Information Systems

Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the...

Full description

Saved in:
Bibliographic Details
Other Authors: Kalloniatis, Christos (Editor)
Format: Electronic Book Chapter
Language:English
Published: IntechOpen 2012
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_66111
005 20210420
003 oapen
006 m o d
007 cr|mn|---annan
008 20210420s2012 xx |||||o ||| 0|eng d
020 |a 2345 
020 |a 9789535106432 
020 |a 9789535156314 
040 |a oapen  |c oapen 
024 7 |a 10.5772/2345  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a GPFC  |2 bicssc 
100 1 |a Kalloniatis, Christos  |4 edt 
700 1 |a Kalloniatis, Christos  |4 oth 
245 1 0 |a Security Enhanced Applications for Information Systems 
260 |b IntechOpen  |c 2012 
300 |a 1 electronic resource (236 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the reputation of the system's stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled "Security Enhanced Applications for Information Systems" and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Cybernetics & systems theory  |2 bicssc 
653 |a Cybernetics & systems theory 
856 4 0 |a www.oapen.org  |u https://mts.intechopen.com/storage/books/1923/authors_book/authors_book.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/66111  |7 0  |z DOAB: description of the publication