Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
This book assesses the strengths and weaknesses - in the context of competitiveness, corporate governance demands and regulatory requirements - of current frameworks (including COSO, CoBIT, ITIL, ISO 15000, ISO17799, AS 8015, GAISP).
Choose an application
In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.
Choose an application
Cryptage des données (Ordinatique) --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Business enterprises --- Electronic funds transfers --- Internet --- World Wide Web (Information retrieval system) --- Chiffrement (Informatique) --- World Wide Web --- Computer networks --- Security measures --- Sécurité --- Mesures --- Sûreté --- Security measures. --- Sécurité --- Sûreté --- Business enterprises - Computer networks - Security measures. --- Internet (Computer network) - Security measures. --- World Wide Web (Information retrieval system) - Security measures.
Choose an application
Table des matières :
Business enterprises --- Computer networks --- Identification cards --- Smart cards --- Security measures --- Identification cards. --- Smart cards. --- Security measures. --- #SBIB:35H24 --- #SBIB:309H1720 --- #SBIB:309H1015 --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near field communication --- Cards, Identification --- Credentials (Identification cards) --- I.D. cards --- ID cards --- Identity cards --- IDs (Identification cards) --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Informatiemanagement bij de overheid --- Informatiekunde, informatie management --- Media: politieke, juridische, ethische, ideologische aspecten (incl. privacy) --- Near-field communication --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Computer networks&delete& --- Registers of births, etc. --- Business enterprises - Computer networks - Security measures --- Computer networks - Security measures
Choose an application
Electronic commerce --- Business enterprises --- Internet --- Security measures --- Computer networks --- -Business enterprises --- -Internet --- 681.3*D46 --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- -Security measures --- Security measures. --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Contains audio-visual material --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer networks&delete& --- Electronic commerce - Security measures --- Business enterprises - Computer networks - Security measures --- Internet - Security measures
Choose an application
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description.
Business enterprises --Computer networks --Security measures. --- Computer security. --- Data protection. --- Information technology --Security measures. --- Business enterprises --- Information technology --- Computer security --- Data protection --- Commerce --- Business & Economics --- Marketing & Sales --- Security measures --- Computer networks --- -Information technology --- -Computer security --- 658.478 --- -Security measures --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Security measures. --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
Computer security. --- Computer networks --- Business enterprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- Security measures --- -Computer networks --- -Public key infrastructure (Computer security) --- AA / International- internationaal --- 654 --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- -Security measures --- Informatieverwerking. Bureautica. --- Distributed processing --- Entreprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Sécurité --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer networks&delete& --- Informatieverwerking. Bureautica --- Computer networks - Security measures --- Business enterprises - Computer networks - Security measures
Choose an application
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Security measures --- Computer networks --- Sécurité informatique --- Infrastructure à clé publique (Sécurité informatique) --- Données --- Commerce électronique --- Entreprises --- Congresses --- Congrès --- Transmissions --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- EPUB-LIV-FT SPRINGER-B --- Computer security - Congresses --- Public key infrastructure (Computer security) - Congresses --- Data transmission systems - Security measures - Congresses --- Electronic commerce - Security measures - Congresses --- Business enterprises - Computer networks - Security measures - Congresses --- Congresses.
Choose an application
Electronic commerce --- Internet --- Business enterprises --- Security measures --- Computer networks --- -Electronic commerce --- -681.3*D46 --- 681.3*C23 --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- -Security measures --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Network operations: network management; network monitoring; public networks --- Security measures. --- 681.3*C23 Network operations: network management; network monitoring; public networks --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 --- Computer networks&delete& --- Electronic commerce - Security measures --- Internet - Security measures --- Business enterprises - Computer networks - Security measures
Choose an application
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement. This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.
Business enterprises -- Computer networks -- Security measures. --- Electronic commerce -- Security measures. --- Electronic commerce. --- HeadingBusiness enterprises. --- Computer Science --- Marketing & Sales --- Engineering & Applied Sciences --- Commerce --- Business & Economics --- Electronic commerce --- Business enterprises --- Security measures. --- Computer networks --- Computer science. --- Computer organization. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer network architectures. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 10 of 13 | << page >> |
Sort by
|