TY - CHAP AU - Barry Lunt AU - Dale Rowe AU - Joseph Ekstrom ED - Christos Kalloniatis Y1 - 2012-05-30 PY - 2012 T1 - Cyber Security N2 - Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments. BT - Security Enhanced Applications for Information Systems SP - Ch. 2 UR - https://doi.org/10.5772/48008 DO - 10.5772/48008 SN - PB - IntechOpen CY - Rijeka Y2 - 2024-03-29 ER -