International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 157    Submit Your Rating     Cite This   Download        Certificate

SECURITY ENGINEERING FOR MOBILE COMPUTING

    1 Author(s):  NARESH

Vol -  1, Issue- 3 ,         Page(s) : 53 - 57  (2010 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

According to Anderson (2001), “security engineering is about building systems to remain dependable in the face of malice, error, or mischance.” Therefore, security of computer based information systems is concerned with methods providing cost effective and operationally effective protection of information systems from undesirable events (Lane, 1985).

order prescription
order online

1. Sarbanes-Oxley Act of 2002. (2002, January). One Hundred Seventh Congress of the United States of America. Retrieved from http:  news.findlaw.com hdocs docs gwbush sarbanesoxley072302.pdf 
2. Schneier, B. (1999, December). Attack trees. Dr. Dobb s Journal, 21–29.
3. Schumacher, M. (2003). Security engineering with patterns. PhD Thesis, Lecture Notes in Computer Science. LNCS 2754. Springer-Verlag.
4. Schumacher, M., & Roedig, U. (2001). Security engineering with patterns. Proceedings of the PLoP 2001 Conference. 
5. Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., & Sommerlad, P. (2006). Security patterns. John Wiley & Sons.
6. Sorgente, T., & Fernandez, E.B. (2004). Analysis patterns for patient treatment. Proceedings of PLoP 2004. Retrieved from http:  jerry.cs.uiuc.cs.uiuc. edu ~plop plop2004 accepted_submissions 

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details