
- 236 pages
- English
- PDF
- Available on iOS & Android
Security Enhanced Applications for Information Systems
About this book
Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users' trust as well as the reputation of the system's stakeholders. Designing and implementing security enhanced systems is of vital importance.Therefore, this book aims to present a number of innovative security enhanced applications. It is titled "Security Enhanced Applications for Information Systems" and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Security Enhanced Applications for Information Systems
- Contents
- Preface
- Chapter 1 Web and Database Security
- Chapter 2 Cyber Security
- Chapter 3 Development of an e-Learning Recommender System Using Discrete Choice Models and Bayesian Theory: A Pilot Case in the Shipping Industry
- Chapter 4 Intrusion Detection and Prevention in High Speed Network
- Chapter 5 Challenges in Building Trusted Information Systems
- Chapter 6 Construction of Effective Database System for Information Risk Mitigation
- Chapter 7 Quality Model – Master Plan and DNA of an Information System
- Chapter 8 Services for the Digital Citizen
- Chapter 9 The Requirements for the Legal Regulation of Commercial Relations in Cloud Computing
- Chapter 10 Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory
- Chapter 11 Building Expert Profiles Models Applying Semantic Web Technologies