Advertisement

Conclusion

  • Charles A. Shoniregun
Part of the Advances in Information Security book series (ADIS, volume 34)

Keywords

Security Policy Network Security Unauthorised Access Security Expert Internet Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Allen, J., Alberts, C., Behrens, S., Laswell, B., and Wilson, W., 2000, Improving the Security of Networked Systems, October 2000, Cross Talk, The Journal of Defence Software Engineering.Google Scholar
  2. Arkko, J., and Nikander, P., 2003, Limitations of IPsec Policy Mechanisms Ericsson Research Nomadic Lab, Jorvas, Finland, http://www.arkko.com/publications/SWP03.pdf (30 January 2007).Google Scholar
  3. Carmes, E. June 2002, IP v6: Answers To Your Questions, http://www.ipv6forum.com/navbar/documents/6WIND-IPv6-answers-v2.0.pdf (28 January 2007).Google Scholar
  4. Cross S E., 2000, Cyber Security, 2000, Software Engineering Institute, Carnegie Mellon University, USA.Google Scholar
  5. Householder, A., Manion, A., Pesante, L. and Weaver, G.M., 2001, Managing the Threat of Denial-of-Service Attacks, Research paper v10.0 presented at CERT Annual Conference, Carnegie Mellon UniversityGoogle Scholar
  6. Interlink Networks, 2003, Link Layer and Network Layer Security for Wireless Networks, http://vnu.bitpipe.com/detail/RES/1055510132_601.html (30 January 2007).Google Scholar
  7. Liu, et al., 2001, E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand, Springer.Google Scholar
  8. Shoniregun, C. A., 2003, Are existing internet security measures guaranteed to protect user identity in the financial services industry?, International Journal of Services, Technology and Management (IJSTM), Volume 4.Google Scholar
  9. Shoniregun, C. A., 2005, Impacts and Risk Assessment of Technology for Internet Security: Enable information Small-medium Enterprises (TEISMEs), Springer New York, USA.Google Scholar
  10. Shoniregun, C.A., 2006a, Keynote speach: ‘Phishing and the Phishers’, IEEE International Conference on Digital Information Management (ICDIM-2007), Banalore, India.Google Scholar
  11. Shoniregun, C.A., 2006b, Distinguished Lecture on Synchronising IPSec with Biomterics, Purdue University Calumet, Indiana, USA.Google Scholar
  12. Timmers, P., 2000, Electronic commerce: strategies and models for B-to-B trading, John Wiley.Google Scholar
  13. Yeung, B. (2006). Biometrics Copyrights. Triware Networld System L.L.C, http://www.tns.com/biometrics.asp (18 January 2007).Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Charles A. Shoniregun
    • 1
  1. 1.Reader in Computing, KNURE/KSAC Distinguished Professor, School of Computing & TechnologyUniversity of East LondonLondon E16 2RDUnited Kingdom

Personalised recommendations