Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
2.6 References
Kizza, Joseph M. Social and Ethical Issues in the Information Age. 2nd edition, New York: Springer, 2003.
Scherphier, A. “CS596 Client-Server Programming Security.”. http://www.sdsu.edu/~cs596/security.html.
McCullagh, Adrian and Willian Caelli “Non-repudiation in the Digital Environment”. http://www.firstmonday.dk/issues/issue5_8/mccullagh/index.html#author
“The Orange Book Site.” http://www.dynamoo.com/orange/.
“CobiT a Practical Toolkit for IT Governance. http://www.ncc.co.uk/ncc/myitadviser/archive/issue8/business_processes.cfm.
“OCTAVE: Information Security Risk Evaluation”. http://www.cert.org/octave/
Department of Homeland Security. http://www.dohs.gov/
Mercuri, Rebecca and Peter Neumann. “Security by Obsecurity”. Communication of the ACM. Vol.46, No.11. Page 160.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Understanding Network Security. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_2
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)