With the greatly increased use of electronic media for processing and storing data, data security became an important practical issue. This is especially true for the extensively shared and distributed systems which are more and more being accepted in commercial operations. Essen tially, the problem is that of protecting data, including all the impli cations which this has to the end user as well as the systems or database designer. However, usually the term data security refers to protection by technical, i.e., computer science specific, means; if one wants to in clude issues such as physical security, how to select the group of people who should have authority to perform certain operations, etc., the term computer security is more appropriate. The object of this book is to provide technical solutions to (facets of) the problem of achieving data security. The reader who hopes to find clever recipes which allow circumventing protection mechanisms will, however, be sadly disappointed. In fact, we deliberately kept the presentation of the material at a fairly general level. While the short term benefit of such an approach may be somewhat smaller, we feel that without a thorough understanding of the fundamental issues and problems in data security there will never be secure systems. True, peo ple probably always considered certain security aspects when designing a system. However, an integrated approach is absolutely imperative.
With the greatly increased use of electronic media for processing and storing data, data security became an important practical issue. This is especially true for the extensively shared and distributed systems which are more and more being accepted in commercial operations. Essen tially, the problem is that of protecting data, including all the impli cations which this has to the end user as well as the systems or database designer. However, usually the term data security refers to protection by technical, i.e., computer science specific, means; if one wants to in clude issues such as physical security, how to select the group of people who should have authority to perform certain operations, etc., the term computer security is more appropriate. The object of this book is to provide technical solutions to (facets of) the problem of achieving data security. The reader who hopes to find clever recipes which allow circumventing protection mechanisms will, however, be sadly disappointed. In fact, we deliberately kept the presentation of the material at a fairly general level. While the short term benefit of such an approach may be somewhat smaller, we feel that without a thorough understanding of the fundamental issues and problems in data security there will never be secure systems. True, peo ple probably always considered certain security aspects when designing a system. However, an integrated approach is absolutely imperative.
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its...
This book presents best selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2022), organized by the Department of Data Science, CHRIST (Deemed...
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the ...
This book is a useful resource for researchers, software developers, educators and managers who want to understand both the high level concepts as well as the technical details on the design and...
Discover your next great read at BookLoop, Australiand online bookstore offering a vast selection of titles across various genres and interests. Whether you're curious about what's trending or searching for graphic novels that captivate, thrilling crime and mystery fiction, or exhilarating action and adventure stories, our curated collections have something for every reader. Delve into imaginative fantasy worlds or explore the realms of science fiction that challenge the boundaries of reality. Fans of contemporary narratives will find compelling stories in our contemporary fiction section. Embark on epic journeys with our fantasy and science fiction titles,
Shop Trending Books and New Releases
Explore our new releases for the most recent additions in romance books, fantasy books, graphic novels, crime and mystery books, science fiction books as well as biographies, cookbooks, self help books, tarot cards, fortunetelling and much more. With titles covering current trends, booktok and bookstagram recommendations, and emerging authors, BookLoop remains your go-to local australian bookstore for buying books online across all book genres.
Shop Best Books By Collection
Stay updated with the literary world by browsing our trending books, featuring the latest bestsellers and critically acclaimed works. Explore titles from popular brands like Minecraft, Pokemon, Star Wars, Bluey, Lonely Planet, ABIA award winners, Peppa Pig, and our specialised collection of ADHD books. At BookLoop, we are committed to providing a diverse and enriching reading experience for all.
Sign In
your cart
Your cart is empty
Menu
Search
PRE-SALES
If you have any questions before making a purchase chat with our online operators to get more information.