Security in the Information Society: Visions and Perspectives
Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are jus...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2002
|
Ausgabe: | 1st ed. 2002 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
86 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt |
Beschreibung: | 1 Online-Ressource (XII, 586 p) |
ISBN: | 9780387355863 |
DOI: | 10.1007/978-0-387-35586-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064023 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2002 |||| o||u| ||||||eng d | ||
020 | |a 9780387355863 |9 978-0-387-35586-3 | ||
024 | 7 | |a 10.1007/978-0-387-35586-3 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-35586-3 | ||
035 | |a (OCoLC)1227480314 | ||
035 | |a (DE-599)BVBBV047064023 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Security in the Information Society |b Visions and Perspectives |c edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan |
250 | |a 1st ed. 2002 | ||
264 | 1 | |a New York, NY |b Springer US |c 2002 | |
300 | |a 1 Online-Ressource (XII, 586 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 86 | |
520 | |a Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Engineering, general | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a The Computing Profession | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Engineering | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computers | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2002 |z Kairo |2 gnd-content | |
689 | 0 | 0 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ghonaimy, M. Adeeb |4 edt | |
700 | 1 | |a El-Hadidi, Mahmoud T. |4 edt | |
700 | 1 | |a Aslan, Heba K. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475710267 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402070303 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475710250 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-35586-3 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471135 | ||
966 | e | |u https://doi.org/10.1007/978-0-387-35586-3 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061520519168 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Ghonaimy, M. Adeeb El-Hadidi, Mahmoud T. Aslan, Heba K. |
author2_role | edt edt edt |
author2_variant | m a g ma mag m t e h mte mteh h k a hk hka |
author_facet | Ghonaimy, M. Adeeb El-Hadidi, Mahmoud T. Aslan, Heba K. |
building | Verbundindex |
bvnumber | BV047064023 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-35586-3 (OCoLC)1227480314 (DE-599)BVBBV047064023 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-0-387-35586-3 |
edition | 1st ed. 2002 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04113nmm a2200661zcb4500</leader><controlfield tag="001">BV047064023</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387355863</subfield><subfield code="9">978-0-387-35586-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-35586-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-35586-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064023</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in the Information Society</subfield><subfield code="b">Visions and Perspectives</subfield><subfield code="c">edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2002</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 586 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">86</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">The Computing Profession</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2002</subfield><subfield code="z">Kairo</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghonaimy, M. Adeeb</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">El-Hadidi, Mahmoud T.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslan, Heba K.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475710267</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402070303</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475710250</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-35586-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471135</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-35586-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2002 Kairo gnd-content |
genre_facet | Konferenzschrift 2002 Kairo |
id | DE-604.BV047064023 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:21Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9780387355863 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471135 |
oclc_num | 1227480314 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XII, 586 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Security in the Information Society Visions and Perspectives edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan 1st ed. 2002 New York, NY Springer US 2002 1 Online-Ressource (XII, 586 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 86 Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt Cryptology Engineering, general Computer Communication Networks Theory of Computation Management of Computing and Information Systems The Computing Profession Data encryption (Computer science) Engineering Computer communication systems Computers Management information systems Computer science Datensicherung (DE-588)4011144-1 gnd rswk-swf Informationsgesellschaft (DE-588)4114011-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2002 Kairo gnd-content Informationsgesellschaft (DE-588)4114011-4 s Datensicherung (DE-588)4011144-1 s DE-604 Ghonaimy, M. Adeeb edt El-Hadidi, Mahmoud T. edt Aslan, Heba K. edt Erscheint auch als Druck-Ausgabe 9781475710267 Erscheint auch als Druck-Ausgabe 9781402070303 Erscheint auch als Druck-Ausgabe 9781475710250 https://doi.org/10.1007/978-0-387-35586-3 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Security in the Information Society Visions and Perspectives Cryptology Engineering, general Computer Communication Networks Theory of Computation Management of Computing and Information Systems The Computing Profession Data encryption (Computer science) Engineering Computer communication systems Computers Management information systems Computer science Datensicherung (DE-588)4011144-1 gnd Informationsgesellschaft (DE-588)4114011-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4114011-4 (DE-588)1071861417 |
title | Security in the Information Society Visions and Perspectives |
title_auth | Security in the Information Society Visions and Perspectives |
title_exact_search | Security in the Information Society Visions and Perspectives |
title_exact_search_txtP | Security in the Information Society Visions and Perspectives |
title_full | Security in the Information Society Visions and Perspectives edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan |
title_fullStr | Security in the Information Society Visions and Perspectives edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan |
title_full_unstemmed | Security in the Information Society Visions and Perspectives edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan |
title_short | Security in the Information Society |
title_sort | security in the information society visions and perspectives |
title_sub | Visions and Perspectives |
topic | Cryptology Engineering, general Computer Communication Networks Theory of Computation Management of Computing and Information Systems The Computing Profession Data encryption (Computer science) Engineering Computer communication systems Computers Management information systems Computer science Datensicherung (DE-588)4011144-1 gnd Informationsgesellschaft (DE-588)4114011-4 gnd |
topic_facet | Cryptology Engineering, general Computer Communication Networks Theory of Computation Management of Computing and Information Systems The Computing Profession Data encryption (Computer science) Engineering Computer communication systems Computers Management information systems Computer science Datensicherung Informationsgesellschaft Konferenzschrift 2002 Kairo |
url | https://doi.org/10.1007/978-0-387-35586-3 |
work_keys_str_mv | AT ghonaimymadeeb securityintheinformationsocietyvisionsandperspectives AT elhadidimahmoudt securityintheinformationsocietyvisionsandperspectives AT aslanhebak securityintheinformationsocietyvisionsandperspectives |