World Library  

Add to Book Shelf
Flag as Inappropriate
Email this Book

Securing the Extended Enterprise in an Electronic World

By Pato, Joe

Click here to view

Book Id: WPLBN0000692087
Format Type: PDF eBook
File Size: 17.28 KB.
Reproduction Date: 2005
Full Text

Title: Securing the Extended Enterprise in an Electronic World  
Author: Pato, Joe
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Publication Date:


APA MLA Chicago

Pato, J. (n.d.). Securing the Extended Enterprise in an Electronic World. Retrieved from

Technical Reference Publication

Abstract: Extranets, Intranets, the Internet?In today?s fluid business environment, where do the boundaries exist? As the very notion of what defines an enterprise is extended through the increasing use of outsourcing, contracting, and collaboration what do we need to protect? This panel will examine the emergence of VPNs and other techniques for securing collaborations within and between organizations. We will consider what forms of containment are necessary, desirable or even possible.

Table of Contents
Table of Contents 22nd National Information Systems Security Conference Conference Committee 1999 National Computer Systems Security Award Papers Find and Fix Y2K Embedded Equipment Risks Dick Lefkon, New York University Are Organizations Ready for the Electronic Renaissance in Communications? Email Monitoring & Privacy Issues Jim Kates, Phillip Whited, IntraSec Corporation Making Netscape Compatible with Fortezza? ? Lessons Learned George Ryan, Pulse Engineering, Inc. Active Networks and Security Vijay Varadharajan, Rajan Shankaran, Michael Hitchens, University of W. Sydney Security of High-Performance Messaging Layers on Programmable Network Interface Architectures Srigurunath Chakravarthi, Mississippi State University Attitude Adjustment: Trojans and Malware on the Internet: an Update Sarah Gordon, David Chess, IBM Thomas J. Watson Research Center The Network Vulnerability Tool (NVT) ? A System Vulnerability Visualization Architecture. Ronda Henning, Ph.D., Kevin L. Fox, Ph.D., Harris Corporation Implementation of Mulitple Access Control Policies within a CORBASEC Framework Ramaswamy Chandramouli, National Institute for Standards and Technology A Trace-Based Model of the Chinese Wall Security Policy Ann E. Kelley Sobel, Miami University (Ohio) Jim Alves-Foss, University of Idaho Digital Watermark Mobile Agents Jian Zhao, Chenghui Luo, Fraunhofer Center for Research in Computer Graphics, Inc. Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta, University of Memphis From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour Dr. Klaus Brunnstein, University of Hamburg, Germany P3I - Protection Profile Process Improvement Jeffrey R. Williams, Karen M. Ferraiolo, Arca Systems, Inc. Protection Profiles for Certificate Issuing & Management Systems A. Arsenault, National Security Agency R. Housley, Spyrus Common Criteria Evaulations in the US: What a Developer Should Know Kimberly S. Caplan, Douglas Stuart, CISSP, Computer Sciences Corporation


Click To View

Additional Books

  • A Policymaker's Guide to Hate Crimes (by )
  • Calvinism : Six Lectures Delivered in th... (by )
  • Born to Run (by )
  • A Theory of Countertrade Financing of In... (by )
  • La Divina Comedia (by )
  • Evaluating International Projects : Weig... (by )
  • Oasis en la Vida (by )
  • Great Essays by Montaigne, Sidney, Milto... (by )
  • Some Implications of the Experience Fact... (by )
  • What Are the Underlying Causes of Poor Q... (by )
  • Prevengamos la Diabetes Tipo 2 (by )
  • A Handbook of Children's Literature Meth... (by )
Scroll Left
Scroll Right


Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.