SEIN 2007: Proceedings of the Third Collaborative Research Symposium on Security, E-Learning, Internet and NetworkingUdo G. Bleimann, Paul Dowland, Steven Furnell, University of Plymouth. Information Security & Network Research Group Lulu.com, 2007 - 275 Seiten |
Inhalt
S W Schilke U Bleimann S M Furnell and A D Phippen | 23 |
Prerequisites for monitoring insider IT misuse | 41 |
Securityrelevance of semantic patterns in crossorganisational business | 67 |
eLearning | 81 |
decision way through narrative approaches methods | 99 |
O Schneider U Bleimann A D Phippen and B HarriehausenMuhlbauer | 115 |
Häufige Begriffe und Wortgruppen
activities adaptation addition alarms alerts algorithm analysis application approach architecture attack audio authentication biometric business process combined communication complexity components Computer concept considered construction correlation defined definition dependent described detection determine device domain effective elements environment evaluation example existing false Figure functions future given harm identify implementation important improve integrated interaction interfaces International Internet introduced intrusion issues knowledge language learning means mechanism methods mobile monitoring needs nodes objectives offer operation organisation performance possible potential presented problem procedures Proceedings reduce relays request respective scenario shaping shows similar software development solution specific step story structure subscriber techniques tests traffic University virtual