ubaiyadullah thameemulansari | Bharathidasan University (original) (raw)

ubaiyadullah thameemulansari

Uploads

Papers by ubaiyadullah thameemulansari

Research paper thumbnail of Information security: an integrated collection of essays

This collection of essays provides a comprehensive summary of practice and research. The essays p... more This collection of essays provides a comprehensive summary of practice and research. The essays provide an overview of the vulnerabilities and threats to information security and introduce the important concepts and terms. In addition, the essays summarize the definitions and controls of the trusted computer system evaluation criteria and discuss information security policy focusing on information control and dissemination. Recommendations are presented based on practical experience. Other essays explore ...

Research paper thumbnail of Network security: private communication in a public world

... Network Warrior, 1st Edition by Gary A. Donahue. Introduction to Computer Security by Matt Bi... more ... Network Warrior, 1st Edition by Gary A. Donahue. Introduction to Computer Security by Matt Bishop. Hacking: The Next Generation, 1st Edition by Nitesh Dhanjani; Billy Rios; Brett Hardin. The classic guide to network security—now fully updated!"Bob and Alice are back!". ...

Research paper thumbnail of Technical opinion: Information system security management in the new millennium

Communications of the ACM, Jan 1, 2000

Research paper thumbnail of Why information security is hard-an economic perspective

… Security Applications Conference, 2001. …, Jan 1, 2001

According to one common view, information security comes down to technical measures. Given better... more According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved.

Research paper thumbnail of Information security: an integrated collection of essays

This collection of essays provides a comprehensive summary of practice and research. The essays p... more This collection of essays provides a comprehensive summary of practice and research. The essays provide an overview of the vulnerabilities and threats to information security and introduce the important concepts and terms. In addition, the essays summarize the definitions and controls of the trusted computer system evaluation criteria and discuss information security policy focusing on information control and dissemination. Recommendations are presented based on practical experience. Other essays explore ...

Research paper thumbnail of Network security: private communication in a public world

... Network Warrior, 1st Edition by Gary A. Donahue. Introduction to Computer Security by Matt Bi... more ... Network Warrior, 1st Edition by Gary A. Donahue. Introduction to Computer Security by Matt Bishop. Hacking: The Next Generation, 1st Edition by Nitesh Dhanjani; Billy Rios; Brett Hardin. The classic guide to network security—now fully updated!"Bob and Alice are back!". ...

Research paper thumbnail of Technical opinion: Information system security management in the new millennium

Communications of the ACM, Jan 1, 2000

Research paper thumbnail of Why information security is hard-an economic perspective

… Security Applications Conference, 2001. …, Jan 1, 2001

According to one common view, information security comes down to technical measures. Given better... more According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved.

Log In