E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.
This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.
ELLENBALKA Simon Fraser University ebalka@Sfu. ca 1. INTRODUCTION In developing the call for papers for the 7th International Federation of Information Processors (IFIP) Women, Work and Computerization Conference, we sought to cast our net widely. We wanted to encourage presenters to think broadly about women, work and computerization. Towards this end, the programme committee developed a call for papers that, in its final form, requested paper submissions around four related themes. These are (1) Setting the Course: Taking Stock of Where We Are and Where We're Going; (2) Charting Undiscovered Terrain: Creating Models, Tools and Theories; (3) Navigating the Unknown: Sex, Time, Space and Place, and (4) Taking the Helm: Education and Pedagogy. Our overall conference theme, 'Charting a Course to the Future' was inspired in part by Vancouver's geography, which is both coastal and mountainous. As such, navigation plays an important part in the lives of many as we seek to enjoy our environs. In addition, as the first Women, Work and Computerization conference of the new millennium, we hoped to encourage the broad community of scholars that has made past Women, Work and Computerization conferences a success to actively engage in imagining--and working towards-- a better future for women in relation to computers. The contributions to this volume are both a reflection of the hard work undertaken by many to improve the situation of women in relation to computerization, and a testament to how much work is yet to be done.
Social Security and Medicare are of compelling concern to virtually all Americans because they impact lives so enduringly and directly through the protection they afford and the costs they entail. It is, indeed, the extraordinary social welfare commitment these programs represent and their concomitant expense that provoke such determined support and such fiscal concern. Kingson and Berkowitz provide a thorough, balanced, and highly accessible explanation of Social Security and Medicare. They explain the dilemmas facing policymakers and describe, through historical development, how the programs evolved and their present status. The authors superbly convey the complexity of issues while also clearly presenting the factual information essential to the understanding and discussion. Such key considerations as the adequacy of protection, the financing problems, issues of fairness, the response to disability, and the health care needs of the elderly are particularly focused on--the authors' are sensitive to the social welfare nature of the programs. A truly essential book not only for the classroom but the offices and living rooms of writers, administrators, planners, policymakers, social service practitioners, and the general public.
Zone Labs Articles
Zone Labs Books