Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is divided into 11 parts covering the essentials of information security technologies, including application-related topics, and issues relating to application development and deployment: security protocols; smart card; network security and intrusion detection; trusted platforms; eSociety; TTP management and PKI; secure workflow environment; secure group communications; risk management; security policies; and trusted system design and management. This book comprises the proceedings of the 16th International Conference on Information Security (Sec'01), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Technical Committee 11. The conference was held in June 2000 in Paris, France.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services. Addressing this security issue, this volume is divided into 11 parts covering the essentials of information security technologies, including application-related topics, and issues relating to application development and deployment: security protocols; smart card; network security and intrusion detection; trusted platforms; eSociety; TTP management and PKI; secure workflow environment; secure group communications; risk management; security policies; and trusted system design and management. This book comprises the proceedings of the 16th International Conference on Information Security (Sec'01), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Technical Committee 11. The conference was held in June 2000 in Paris, France.