Narrow your search

Library

ULB (9)

AP (8)

KDG (8)

KU Leuven (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

ULiège (8)

VIVES (8)

Odisee (7)

More...

Resource type

book (15)

digital (8)


Language

English (21)

German (2)


Year
From To Submit

2015 (2)

2014 (2)

2013 (2)

2012 (2)

2011 (3)

More...
Listing 1 - 10 of 23 << page
of 3
>>
Sort by

Book
Trusted Computing : Ein Weg zu neuen IT-Sicherheitsarchitekturen
Authors: ---
ISBN: 3834894524 Year: 2008 Publisher: Wiesbaden : Vieweg+Teubner Verlag : Imprint: Vieweg+Teubner Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Trusted Computing markiert einen grundsätzlichen Wandel der IT-Sicherheitsarchitekturen. Erstmals werden die Potenziale von sicherer integrierten Hard- und Software verfügbar. Seit 1999 sind die wesentlichen Konzepte, Standards, Baugruppen und Softwaremodule entwickelt und zur Anwendungsreife gebracht worden. Das Buch fasst die vorliegenden Grundlagen zusammen. Es behandelt erstmals wichtige Anwendungsszenarien mit signifikantem Sicherheitsgewinn für IT-Systembetreiber und -anwender. Besonders berücksichtigt wird dabei Open Source Software als Beitrag zur Vertrauenswürdigkeit der Lösungen. Es wird gezeigt, dass Trusted Computing die traditionellen chipkartenbasierten Konzepte der IT-Sicherheit wirkungsvoll ergänzt und dass Datenschutz und andere rechtliche Vorgaben erfüllt werden.


Book
ISSE 2014 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2014 Conference
Authors: --- ---
ISBN: 365806708X 3658067071 Year: 2014 Publisher: Wiesbaden : Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2014 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Trust Services, eID and Cloud Security - BYOD and Mobile Security - Cybersecurity, Cybercrime, Critical Infrastructures - Security Management, CISO Inside - Privacy, Data Protection, Human Factors - Regulation & Policies Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014. Content Trust Services, eID, Cloud Security & Management – BYOD, Mobile Security & Applications – Cybersecurity, Cybercrime, Critical Infrastructures – Security Management, CISO’s Experiences – Human Factors, Awareness & Privacy – Regulations and Policies Target Groups Chief Information Security Officers Developers of Electronic Business Processes IT Managers IT Security Experts Researchers Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen. Additionally he is president of the IT Security Association TeleTrusT. Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.


Book
ISSE 2015 : Highlights of the Information Security Solutions Europe 2015 Conference
Authors: --- ---
ISBN: 3658109335 3658109343 Year: 2015 Publisher: Wiesbaden : Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: ·         Encrypted Communication ·         Trust Services, eID and Cloud Security ·         Industrial Security and Internet of Things ·         Cybersecurity, Cybercrime, Critical Infrastructures ·         BYOD and Mobile Security ·         Regulation and Policies ·         Biometric Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2015. Content ·         Encrypted Communication ·         Trust Services, eID, Cloud Security and Management ·         Industrial Security and Internet of Things ·         BYOD, Mobile Security and Applications ·         Cybersecurity, Cybercrime, Critical Infrastructures       ·   Security Management ·         Regulations and Policies Target Groups ·         Chief Information Security Officers ·         Developers of Electronic Business Processes ·         IT Managers ·          IT Security Experts ·         Researchers Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen. Additionally he is chairman of TeleTrusT – IT Security Association Germany. Helmut Reimer: Senior Consultant, TeleTrusT – IT Security Association Germany Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.


Book
ISSE 2009 : securing electronic business processes : highlights of the Information Security Solutions Europe 2009 Conference
Authors: --- ---
ISBN: 3834809586 3834893633 Year: 2010 Publisher: Wiesbaden : Vieweg + Teubner,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2009. Content/noch mit MS abgleichen!! Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Target Group: - Developers of Electronic Business Processes - IT Managers - IT Security Experts - Researchers Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT Abouth the Editors: Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT.


Digital
ISSE 2006 — Securing Electronic Busines Processes : Highlights of the Information Security Solutions Europe 2006 Conference
Authors: --- ---
ISBN: 9783834891952 Year: 2006 Publisher: Wiesbaden Friedr. Vieweg & Sohn Verlag / GWV-Fachverlage GmbH, Wiesbaden

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
ISSE/SECURE 2007 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe/SECURE 2007 Conference
Authors: --- ---
ISBN: 9783834894182 Year: 2007 Publisher: Wiesbaden Friedr. Vieweg & Sohn Verlag / GWV Fachverlage GmbH, Wiesbaden

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
ISSE 2008 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2008 Conference
Authors: --- ---
ISBN: 9783834892836 Year: 2009 Publisher: Wiesbaden Vieweg+Teubner Verlag / GWV Fachverlage GmbH, Wiesbaden

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
ISSE 2010 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2010 Conference
Authors: --- ---
ISBN: 9783834897886 Year: 2011 Publisher: Wiesbaden Vieweg+Teubner

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
ISSE 2013 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2013 Conference
Authors: --- ---
ISBN: 9783658033712 Year: 2013 Publisher: Wiesbaden Springer Fachmedien Wiesbaden, Imprint: Springer Vieweg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.   Content Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications   Target Groups Developers of Electronic Business Processes IT Managers IT Security Experts Researchers   Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.


Digital
ISSE 2014 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2014 Conference
Authors: --- ---
ISBN: 9783658067083 Year: 2014 Publisher: Wiesbaden Springer Fachmedien Wiesbaden, Imprint: Springer Vieweg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most interesting talks given at ISSE 2014 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Trust Services, eID and Cloud Security - BYOD and Mobile Security - Cybersecurity, Cybercrime, Critical Infrastructures - Security Management, CISO Inside - Privacy, Data Protection, Human Factors - Regulation & Policies Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014. Content Trust Services, eID, Cloud Security & Management – BYOD, Mobile Security & Applications – Cybersecurity, Cybercrime, Critical Infrastructures – Security Management, CISO’s Experiences – Human Factors, Awareness & Privacy – Regulations and Policies Target Groups Chief Information Security Officers Developers of Electronic Business Processes IT Managers IT Security Experts Researchers Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen. Additionally he is president of the IT Security Association TeleTrusT. Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.

Listing 1 - 10 of 23 << page
of 3
>>
Sort by