Detalles de la Emisión
Detalles de la Emisión

< Ant.
Sig. >
 
Título Vol. 6, n. 6 (Nov.-Dec., 2008): Process Control SecurityEmisión de Seriada
Parte de IEEE. Security & Privacy
Publicación New York : IEEE. Computer Society Publications Office, 2008
Idioma Inglés;
Materia(s) Sistemas de control de seguridad; SEGURIDAD - SISTEMAS; REDES - ACCESO GLOBAL; GUÍA DE SEGURIDAD - SISTEMAS; PROTECCIÓN DE INFORMACIÓN - IMPACTO ECONÓMICO; Telefonía celular; BULLET, SILVER - ENTREVISTA; Ciberespacio; Ciberseguridad; SEGURIDAD - SISTEMAS - ENSEÑANZA;
Resumen Con: 1. Features 1.1 Process Control Security 1.1.1 Guest Editor's Introduction. / Charles C. Palmer and ROn Trellue.p.22. 1.1.2 Security for Process Control systems: An overview. / Markus Brandle and Martín Naedele.p.24. 1.1.3 Usable Global network access policy for process control systems. / David M. Nicol, William H. Sanders, Sankalp Singh, and Mouna Seri.p.30. 1.1.4 Vulnerability Assessment for critical infrastructure control systems. / Raymond C. Parks and Edmond Rogers.p.37. 1.1.5 The Crutial way of critical infrastructure protection. / Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, and Paulo Veríssimo.p.44. 1.2 Voice over IP 1.2.1 SDRS: a voice-over-IP spam detection and reaction system. / Bertrand Mathieu, Saverio Niccolini, and Dorgham Sisalem.p.52. 1.3 Trusted Computing 1.3.1 Challenges for trusted computing. / Shane Balfe, Eimear Gallery, Chris J. Mitchell, and Kenneth G. Paterson.p.60. 2. Departments 2.1 From the Editors 2.1.1 Are Governments up to the task?. / Bret michael.p.4. 2.2 Interview 2.2.1 Silver Bullet talks with Matt bishop. / Gary McGraw.p.6. 2.3 Spotlight 2.3.1 Launching into the Cyberspace race: an interview with Melissa E. Hathaway. / O. Sami Saydjari.p.11. 2.4 News 2.4.1 Shaking up the Cybersecurity Landscape. / James Figueroa.p.18. 2.4.2 News Briefs. / Brandi Ortega.p.20. 2.5 Education 2.5.1 Teaching for conceptual change in Security awareness. / Yuen-Yan Chan and Victor K. Wei.p.67. 2.6 Privacy Interests 2.6.1 HIPAA Security enforcement is here./ Kirk J. Nahra.p.70. 2.7 Basic Training 2.7.1 Introduction to Microsoft.NET Security. / Chengyun Chu.p.73. 2.8 Attack Trends 2.8.1 Five User-Customizable Web site security features. / Jeremiah Grossman.p.79. 2.9 Building Security In 2.9.1 State of application assessment. / John Steven.p.82. 2.9.2 Advertiser Index.p.78. 3. Columns 3.1 For Good Measure 3.1.1 Security is a subset of reliability. / Daniel E. Geer JR. and Daniel G. Conway.p.86. 3.2 Clear Text 3.2.1 Complexity is the enemy. / Daniel E. Geer JR.p.88.
Disponibilidad
CodBarras Localización Ubicación Habitual Signatura Estado Categoría Solicitar
0034003720Universidad de San Buenaventura - Sede BogotáColección Depósito IEEE.Se.Pr. / 6 (2008) Ej.1DisponibleHemerotecaSolicitar