Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Claudia Eckert beschreibt hier systematisch, welche Aspekte bei der Planung sicherer informationstechnischer Systeme eine Rolle spielen und welche verschiedenen Ansätze verfolgt werden können. Sie stellt die Verfahren und Protokolle, die zur Umsetzung der Sicherheitsanforderungen benötigt werden, detailliert vor und erläutert sie anhand von Fallbeispielen. Ein Muss für jeden, der sich mit der hochaktuellen Problematik "IT-Sicherheit" beschäftigt.
Information technology --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Risk management. --- Security measures. --- Cloud computing --- Information technology. --- Electronic data processing --- Web services --- Distributed processing --- Internet, security models, network security, protocols, IT systems.
Choose an application
Choose an application
vi The process is important! I learned this lesson the hard way during my previous existence working as a design engineer with PA Consulting Group's Cambridge Technology Centre. One of my earliest assignments involved the development of a piece of labo- tory automation equipment for a major European pharmaceutical manufacturer.Two things stick in my mind from those early days – first, that the equipment was always to be ready for delivery in three weeks and,second,that being able to write well structured Pascal was not sufficient to deliver reliable software performance. Delivery was ultimately six months late,the project ran some sixty percent over budget and I gained my first promotion to Senior Engineer. At the time it puzzled me that I had been unable to predict the John Clarkson real effort required to complete the automation project – I had Reader in Engineering Design, genuinely believed that the project would be finished in three Director, Cambridge Engineering weeks.It was some years later that I discovered Kenneth Cooper's Design Centre papers describing the Rework Cycle and realised that I had been the victim of “undiscovered rework”.I quickly learned that project plans were not just inaccurate,as most project managers would attest,but often grossly misleading,bearing little resemblance to actual development practice.
Engineering. --- Engineering Design. --- Management/Business for Professionals. --- Manufacturing, Machines, Tools. --- User Interfaces and Human Computer Interaction. --- Computer science. --- Engineering design. --- Machinery. --- Industrial management. --- Ingénierie --- Informatique --- Conception technique --- Machines --- Gestion d'entreprise --- Engineering design --- Civil & Environmental Engineering --- Civil Engineering --- Engineering & Applied Sciences --- 745.036 --- Design, Engineering --- Engineering --- Industrial design --- Strains and stresses --- Design --- 745.036 Design --- Management. --- User interfaces (Computer systems). --- Manufacturing industries. --- Machines. --- Tools. --- Manufactures. --- Manufacturing, Machines, Tools, Processes. --- Informatics --- Science --- Manufactured goods --- Manufactured products --- Products --- Products, Manufactured --- Commercial products --- Manufacturing industries --- Administration --- Industrial relations --- Organization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Data Encryption. --- Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Business enterprises --- Computer networks --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems
Choose an application
This book provides extensive information on the key technical design disciplines, education programs, international best practices and modes of delivery that are aimed at preparing a trans-disciplinary design workforce for the future. It also presents a comprehensive overview of the scope of, and state of the art in, design education. The book highlights signature design education programs from around the globe and across all levels, in both traditional and distance learning settings. Additionally, it discusses professional societies for designers and design educators, as well as the current standards for professional registration, and program accreditation. Reflecting recent advances and emerging trends, it offers a valuable handbook for design practitioners and managers, curriculum designers and program leaders alike. It will also be of interest to students and academics looking to develop a career related to the more technical aspects of design. .
Engineering design --- Design, Engineering --- Engineering --- Industrial design --- Strains and stresses --- Study and teaching. --- Design --- Engineering design. --- Technical education. --- Production management. --- Industrial engineering. --- Engineering Design. --- Engineering/Technology Education. --- Production. --- Industrial and Production Engineering. --- Management engineering --- Simplification in industry --- Value analysis (Cost control) --- Manufacturing management --- Industrial management --- Education, Technical --- Education --- Professional education --- Vocational education --- Production engineering. --- Manufacturing engineering --- Process engineering --- Industrial engineering --- Mechanical engineering
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- cloud computing --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
Choose an application
Choose an application
Dieses Buch zum Projekt Next Generation Certification (NGCert) betrachtet die Grundlagen vertrauenswürdiger Cloud-Services. Es wird ein Konzept für eine dynamische Zertifizierung zur Förderung von Vertrauen, Rechtsverträglichkeit, Qualität und Nutzen von Cloud-Services am deutschen Markt entwickelt. Ein Prototyp zeigt den exemplarischen Einsatz der entwickelten Werkzeuge in der Praxis. Der Inhalt Auswahl und dynamische Zertifizierung von Cloud-Services Entwicklung und Evaluation eines Prototyps zum Nachweis vertrauenswürdiger Cloud-Services Handlungsempfehlungen für Cloud-Service-Provider, Cloud-Kunden, Zertifizierer und Gesetzgeber Die Zielgruppen Lehrende und Studierende der Wirtschaftsinformatik, Wirtschaftswissenschaften und Informatik Cloud-Service-Provider und Cloud-Zertifizierer sowie Mitarbeiter und Mitarbeiterinnen in Aufsichtsbehörden Die Herausgeber Prof. Dr. Helmut Krcmar ist Inhaber des Lehrstuhls für Wirtschaftsinformatik der TU München und Sprecher des wiss. Direktoriums von fortiss. Prof. Dr. Claudia Eckert ist Inhaberin des Lehrstuhls für IT Sicherheit der TU München und leitet das Fraunhofer AISEC. Prof. Dr. Alexander Roßnagel ist Professor für öffentliches Recht an der Universität Kassel und Direktor des ITeG. Prof. Dr. Ali Sunyaev ist Professor für Wirtschaftsinformatik an der Universität Kassel und Direktor des ITeG. Dr. Manuel Wiesche ist Forschungsgruppenleiter an der TU München. .
Listing 1 - 9 of 9 |
Sort by
|