Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
6
views
1
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
7,074
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
New Approaches for Security, Privacy and Trust in Complex Environments
Certifying the Computer Security Professional Using the Project Management Institute’s PMP Model
other
Author(s):
Kara L. Nance
,
Brian Hay
Publication date
(Print):
2007
Publisher:
Springer US
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
1
Record
: found
Abstract
: not found
Article
: not found
Book Review: A Guide to the Project Management Body of Knowledge (PMBOK® Guide)—Third Edition
Kenneth Rose
(2005)
0
comments
Cited
1
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2007
Pages
: 491-496
DOI:
10.1007/978-0-387-72367-9_46
SO-VID:
d3f0153b-0ef5-45ee-a963-5deba6f929aa
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints
pp. 13
Digital Forensic Readiness as a Component of Information Security Best Practice
pp. 25
Value creation and Return On Security Investments (ROSI)
pp. 37
Usability and Security of Personal Firewalls
pp. 49
Trusted Ticket Systems and Applications
pp. 61
Trust Evaluation for Web Applications based on Behavioral Analysis
pp. 73
Improving the Information Security Model by using TFI
pp. 85
Ontological Mapping of Common Criteria’s Security Assurance Requirements
pp. 97
Management of Exceptions on Access Control Policies
pp. 109
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
pp. 121
Exploratory survey on an Evaluation Model for a Sense of Security
pp. 133
Employees’ Adherence to Information Security Policies: An Empirical Study
pp. 145
Phishing in the Wireless: Implementation and Analysis
pp. 157
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks
pp. 169
A Credential-Based System for the Anonymous Delegation of Rights
pp. 181
Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content
pp. 193
Identity Theft — Empirical evidence from a Phishing Exercise
pp. 205
A Practical Usability Evaluation of Security Features in End-User Applications
pp. 217
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis
pp. 229
A Survey of Bots Used for Distributed Denial of Service Attacks
pp. 241
A Hybrid PKI-IBC Based Ephemerizer System
pp. 253
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices
pp. 265
Security Remarks on a Convertible Nominative Signature Scheme
pp. 277
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions
pp. 289
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation
pp. 301
Extending Role Based Access Control Model for Distributed Multidomain Applications
pp. 313
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
pp. 325
Enabling Privacy of Real-Life LBS
pp. 337
Crafting Web Counters into Covert Channels
pp. 349
OPA: Onion Policy Administration Model — Another approach to manage rights in DRM
pp. 361
Non-Repudiation in Internet Telephony
pp. 373
FirePatch: Secure and Time-Critical Dissemination of Software Patches
pp. 397
Building a Distributed Semantic-aware Security Architecture
pp. 409
Using Trust to Resist Censorship in the Presence of Collusion
pp. 421
Evaluating the Effects of Model Generalization on Intrusion Detection Performance
pp. 433
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM
pp. 443
Covert Identity Information in Direct Anonymous Attestation (DAA)
pp. 449
Safeguarding Personal Data using Rights Management in Distributed Applications
pp. 457
Identification Now and in the Future: Social Grant Distribution Process in South Africa
pp. 461
Hard-drive Disposal and Identity Fraud
pp. 467
An analysis of security and privacy issues relating to RFID enabled ePassports
pp. 473
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework
pp. 479
Teaching of Information Security in the “Health Care and Nursing” Postgraduate program
pp. 485
Remote Virtual Information Assurance Network
pp. 491
Certifying the Computer Security Professional Using the Project Management Institute’s PMP Model
Similar content
7,074
Comparison of outer membrane protein genes omp and pmp in the whole genome sequences of Chlamydia pneumoniae isolates from Japan and the United States.
Authors:
M Shirai
,
H Hirakawa
,
K Ouchi
…
PMP InterConnect.
Authors:
A new pixel matching method using the entire modulation of the measured object in online PMP
Authors:
Kuang Peng
,
Yi-ping Cao
,
Kun Li
…
See all similar