Listing 1 - 10 of 23 | << page >> |
Sort by
|
Choose an application
Trusted Computing markiert einen grundsätzlichen Wandel der IT-Sicherheitsarchitekturen. Erstmals werden die Potenziale von sicherer integrierten Hard- und Software verfügbar. Seit 1999 sind die wesentlichen Konzepte, Standards, Baugruppen und Softwaremodule entwickelt und zur Anwendungsreife gebracht worden. Das Buch fasst die vorliegenden Grundlagen zusammen. Es behandelt erstmals wichtige Anwendungsszenarien mit signifikantem Sicherheitsgewinn für IT-Systembetreiber und -anwender. Besonders berücksichtigt wird dabei Open Source Software als Beitrag zur Vertrauenswürdigkeit der Lösungen. Es wird gezeigt, dass Trusted Computing die traditionellen chipkartenbasierten Konzepte der IT-Sicherheit wirkungsvoll ergänzt und dass Datenschutz und andere rechtliche Vorgaben erfüllt werden.
Computer security. --- Information technology. --- Business—Data processing. --- Systems and Data Security. --- IT in Business.
Choose an application
This book presents the most interesting talks given at ISSE 2014 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Trust Services, eID and Cloud Security - BYOD and Mobile Security - Cybersecurity, Cybercrime, Critical Infrastructures - Security Management, CISO Inside - Privacy, Data Protection, Human Factors - Regulation & Policies Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014. Content Trust Services, eID, Cloud Security & Management – BYOD, Mobile Security & Applications – Cybersecurity, Cybercrime, Critical Infrastructures – Security Management, CISO’s Experiences – Human Factors, Awareness & Privacy – Regulations and Policies Target Groups Chief Information Security Officers Developers of Electronic Business Processes IT Managers IT Security Experts Researchers Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen. Additionally he is president of the IT Security Association TeleTrusT. Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.
Electronic commerce --- Information technology --- Security measures. --- Computer security. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: · Encrypted Communication · Trust Services, eID and Cloud Security · Industrial Security and Internet of Things · Cybersecurity, Cybercrime, Critical Infrastructures · BYOD and Mobile Security · Regulation and Policies · Biometric Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2015. Content · Encrypted Communication · Trust Services, eID, Cloud Security and Management · Industrial Security and Internet of Things · BYOD, Mobile Security and Applications · Cybersecurity, Cybercrime, Critical Infrastructures · Security Management · Regulations and Policies Target Groups · Chief Information Security Officers · Developers of Electronic Business Processes · IT Managers · IT Security Experts · Researchers Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen. Additionally he is chairman of TeleTrusT – IT Security Association Germany. Helmut Reimer: Senior Consultant, TeleTrusT – IT Security Association Germany Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.
Computer Science --- Engineering & Applied Sciences --- Electronics --- Technological innovations --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Electrical engineering --- Physical sciences --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2009. Content/noch mit MS abgleichen!! Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Target Group: - Developers of Electronic Business Processes - IT Managers - IT Security Experts - Researchers Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT Abouth the Editors: Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT.
Business -- Technological innovations. --- Electronic Commerce. --- Electronic data interchange. --- Engineering & Applied Sciences --- Computer Science --- Information technology --- Electronic commerce --- Security measures --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- IT (Information technology) --- Computer science. --- Computer security. --- Computer Science. --- Computer Science, general. --- Systems and Data Security. --- Commerce --- Information superhighway --- Technology --- Telematics --- Knowledge management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection
Choose an application
Computer science --- Information systems --- cryptologie --- programmatielogica
Choose an application
Computer science --- Information systems --- cryptologie --- programmatielogica
Choose an application
Computer architecture. Operating systems --- informatica --- computerbeveiliging
Choose an application
Choose an application
This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013. Content Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications Target Groups Developers of Electronic Business Processes IT Managers IT Security Experts Researchers Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- cloud computing --- computers --- informatica --- computerbeveiliging --- computerkunde
Choose an application
This book presents the most interesting talks given at ISSE 2014 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Trust Services, eID and Cloud Security - BYOD and Mobile Security - Cybersecurity, Cybercrime, Critical Infrastructures - Security Management, CISO Inside - Privacy, Data Protection, Human Factors - Regulation & Policies Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014. Content Trust Services, eID, Cloud Security & Management – BYOD, Mobile Security & Applications – Cybersecurity, Cybercrime, Critical Infrastructures – Security Management, CISO’s Experiences – Human Factors, Awareness & Privacy – Regulations and Policies Target Groups Chief Information Security Officers Developers of Electronic Business Processes IT Managers IT Security Experts Researchers Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen. Additionally he is president of the IT Security Association TeleTrusT. Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- cloud computing --- computers --- informatica --- computerbeveiliging --- computerkunde
Listing 1 - 10 of 23 | << page >> |
Sort by
|