Information Management & Computer Security: Volume 7 Issue 2

Subjects:

Table of contents

Dissecting the “Hacker Manifesto”

S.M. Furnell, P.S. Dowland, P.W. Sanders

Twelve years ago, a text was written within the hacking community which is widely referred to as the “Hacker Manifesto”. This text, and the opinions that it offers, have since…

1981

An introduction to automated intrusion detection approaches

Rod Hart, Darren Morgan, Hai Tran

Defines and categorizes the types of intrusions that can be made on information systems. Characterizes a good intrusion detection system and examines and compares commercial…

981

Digital signatures and the future of documentation

Stephen Wilson

While the business world has been moving inexorably online ever since the PC appeared, documentation itself has remained paper based for the most part. Paper of course has several…

1360

Step‐by‐step guideline for designing and documenting the navigation structure of multimedia hypertext systems

Eng Huat Ng

Most traditional navigational design techniques do not provide a good mechanism for dealing with the complexity of the navigational path of multimedia hypertext (or hypermedia…

The evolution of certificate model architecture

Carrie Liddy, Alice Sturgeon

Many products and enterprise solutions are becoming available to ensure seamless, secured electronic transactions, all of which must find common trust. This paper reviews the…

446
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid