Security Enhanced Applications for Information Systems
Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IntechOpen
2012
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_66111 | ||
005 | 20210420 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210420s2012 xx |||||o ||| 0|eng d | ||
020 | |a 2345 | ||
020 | |a 9789535106432 | ||
020 | |a 9789535156314 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/2345 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a GPFC |2 bicssc | |
100 | 1 | |a Kalloniatis, Christos |4 edt | |
700 | 1 | |a Kalloniatis, Christos |4 oth | |
245 | 1 | 0 | |a Security Enhanced Applications for Information Systems |
260 | |b IntechOpen |c 2012 | ||
300 | |a 1 electronic resource (236 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the reputation of the system's stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled "Security Enhanced Applications for Information Systems" and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Cybernetics & systems theory |2 bicssc | |
653 | |a Cybernetics & systems theory | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/1923/authors_book/authors_book.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/66111 |7 0 |z DOAB: description of the publication |