This volume examines the evolution of information security in the information age - when data traffic is tripling every year and will overtake voice as the dominant type of traffic over the worldwide telecommunication networks by 2005. The authors identify threats and vulnerabilities to the information society related to computer viruses and cellular communications, that are by nature constantly changing. A number of articles present solutions for better information protection, including cryptographic software and TEMPEST-type of solutions.
- 29 views