National Computer Security Conference Proceedings, 1992


Book Description

Held October 13-16, 1992. Emphasizes information systems security criteria (& how it affects us), and the actions associated with organizational accreditation. These areas are highlighted by emphasizing how organizations are integrating information security solutions. Includes presentations from government, industry and academia and how they are cooperating to extend the state-of-the-art technology to information systems security. 72 referred papers, trusted systems tutorial and 23 executive summaries. Very valuable! Must buy!




Computer and Information Sciences -- ISCIS 2003


Book Description

This book constitutes the refereed proceedings of the 18th International Symposium on Computer and Information Sciences, ISCIS 2003, held in Antalya, Turkey in November 2003. The 135 revised papers presented together with 2 invited papers were carefully reviewed and selected from over 360 submissions. The papers are organized in topical sections on architectures and systems, theoretical computer science, databases and information retrieval, e-commerce, graphics and computer vision, intelligent systems and robotics, multimedia, networks and security, parallel and distributed computing, soft computing, and software engineering.




Security and Privacy in the Age of Uncertainty


Book Description

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.







The Social Impact of Computers


Book Description

The Social Impact of Computers should be read as a guide to the social implications of current and future applications of computers. Among the basic themes presented are the following: the changing nature of work in response to technological innovation as well as the threat to jobs; personal freedom in the machine age as manifested by challenges to privacy, dignity, and work; the relationship between advances in computer and communications technology and the possibility of increased centralization of authority; and the emergence and influence of artificial intelligence and its role in decision-making, especially in military applications. The book begins with background and historical information on computers and technology. Separate chapters then cover major applications: business, medicine, education, government; major social issues, including crime, privacy, work; and new technologies and problems: industry regulation, electronic funds transfer systems, international competition, national industrial policies, robotics and industrial automation, productivity, the information society, videotex. The final chapter discusses issues associated with ethics and professionalism. The material presented should be accessible to most university students who have had an introductory course in computer science. Self taught or sufficiently motivated individuals who have gained an understanding of how computers operate should also profit from this book. Especially useful are backgrounds in sociology, economics, history, political science, or philosophy.




Computational Intelligence in Security for Information Systems


Book Description

The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligent and Soft Computing contains accepted - rd th pers presented at CISIS’09, which was held in Burgos, Spain, on September 23 -26 , 2009. After a through peer-review process, the International Program Committee selected 25 papers which are published in this workshop proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate close to 50% of the originally submitted manuscripts.




Proceedings


Book Description