Security Enhanced Applications for Information Systems

Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the...

Full description

Bibliographic Details
Main Author: Kalloniatis, Christos
Format: eBook
Language:English
Published: IntechOpen 2012
Subjects:
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 01954nma a2200289 u 4500
001 EB001986245
003 EBX01000000000000001149147
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210512 ||| eng
020 |a 9789535156314 
020 |a 2345 
020 |a 9789535106432 
100 1 |a Kalloniatis, Christos 
245 0 0 |a Security Enhanced Applications for Information Systems  |h Elektronische Ressource 
260 |b IntechOpen  |c 2012 
300 |a 1 electronic resource (236 p.) 
653 |a Cybernetics & systems theory 
653 |a Cybernetics & systems theory / bicssc 
700 1 |a Kalloniatis, Christos 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by/3.0/ 
028 5 0 |a 10.5772/2345 
856 4 0 |u https://mts.intechopen.com/storage/books/1923/authors_book/authors_book.pdf  |7 0  |x Verlag  |3 Volltext 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/66111  |z DOAB: description of the publication 
520 |a Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the reputation of the system's stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled "Security Enhanced Applications for Information Systems" and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments.