Listing 1 - 10 of 21 | << page >> |
Sort by
|
Choose an application
A discussion of basic security problems and relevant solutions for those maintaining the security of e-commerce sites. It covers designing secure Web, e-commerce and mobile commerce applications; securing your internal network; and providing secure employee/user authentication.
Choose an application
Face à tous ceux qui font de l'internet une gigantesque galerie marchande, une zone étroitement surveillée, et même un danger que les pouvoirs publics veulent brider, Laurent Chemla résiste. Pour lui le Net est d'abord un bien commun au même titre que l'air que nous respirons. Ce qu'il faut avant tout y protéger, ce n'est pas la sensibilité de quelques bonnes âmes mais bien la liberté d'expression, enfin à la portée de tous. Ces Confessions sont donc sa réponse à tous les « dinosaures » qui pérorent sur les « risques » de l'internet sans savoir de quoi ils parlent, juste pour préserver leur monopole de la parole publique. Démontant tous les mythes colportés autour du Net - de la sécurité des paiements au respect de la vie privée en passant par la viabilité des futurs réseaux -, Laurent Chemla remet fortement les discours médiatiques des pseudo-experts à leur place. Demain, l'internet sera libre ou ne sera pas ! (Quatrième de couverture)
Internet --- Sécurité --- Electronic commerce --- Economic aspects --- Social aspects --- Access control --- Security measures --- Internet - Economic aspects --- Internet - Social aspects --- Internet - Access control --- Electronic commerce - Security measures
Choose an application
Data encryption (Computer science) --- Data protection --- Electronic commerce --- Law and legislation --- Security measures --- Cryptography --- Cryptographie --- Data encryption (Computer science) - Law and legislation - France --- Data protection - Law and legislation - France --- Electronic commerce - Security measures - France --- COMMERCE ELECTRONIQUE --- SIGNATURE ELECTRONIQUE --- DROIT DE LA PREUVE --- DONNEES A CARACTERE PERSONNEL --- CONVENTIONS SECRETES
Choose an application
This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: Information Security Strategy; Enterprise and Cloud Computing Security Security and Privacy; Impact of Green Energy; Human Factors of IT Security Solutions for Mobile Applications; Identity & Access Management Trustworthy Infrastructures; Separation & Isolation EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security: Hackers & Threats Target Groups Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westfälische University for Applied Sciences Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT.
Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Engineering & Applied Sciences --- Computer Science --- Information Technology --- Computer Science (Hardware & Networks) --- Electronic commerce --- Security measures --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer Science. --- Computer Science, general. --- Commerce --- Information superhighway --- Informatics --- Science
Choose an application
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
Computer Science. --- Systems and Data Security. --- Economics/Management Science, general. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Computer science. --- Computer network architectures. --- Data protection. --- Data structures (Computer science). --- Economics. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Economie politique --- Architectures --- Computer networks --- Data encryption (Computer science) --- Electronic commerce --- Computers --- Security measures --- Economic aspects --- Access control --- Computer networks - Security measures - Economic aspects - Congresses --- Data encryption (Computer science) - Economic aspects - Congresses --- Electronic commerce - Security measures - Congresses --- Computers - Access control - Economic aspects - Congresses
Choose an application
Electronic commerce --- Business enterprises --- Internet --- Security measures --- Computer networks --- -Business enterprises --- -Internet --- 681.3*D46 --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- -Security measures --- Security measures. --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Contains audio-visual material --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer networks&delete& --- Electronic commerce - Security measures --- Business enterprises - Computer networks - Security measures --- Internet - Security measures
Choose an application
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
Computer networks -- Access control -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Electronic commerce -- Security measures -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Computer networks --- Electronic commerce --- Security measures --- Access control --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Commerce --- Information superhighway --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Security measures --- Computer networks --- Sécurité informatique --- Infrastructure à clé publique (Sécurité informatique) --- Données --- Commerce électronique --- Entreprises --- Congresses --- Congrès --- Transmissions --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- EPUB-LIV-FT SPRINGER-B --- Computer security - Congresses --- Public key infrastructure (Computer security) - Congresses --- Data transmission systems - Security measures - Congresses --- Electronic commerce - Security measures - Congresses --- Business enterprises - Computer networks - Security measures - Congresses --- Congresses.
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Systèmes informatiques --- Confiance --- Ordinateurs --- Sécurité informatique --- Commerce électronique --- Reliability --- Congresses --- Access control --- Security measures --- Fiabilité --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer security -- Congresses. --- Computer systems -- Reliability -- Congresses. --- Computers -- Access control -- Congresses. --- Electronic books. -- local. --- Electronic commerce -- Security measures -- Congresses. --- Trust -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Trust (Psychology) --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Commerce --- Information superhighway --- Attitude (Psychology) --- Emotions
Choose an application
Electronic commerce --- Internet --- Business enterprises --- Security measures --- Computer networks --- -Electronic commerce --- -681.3*D46 --- 681.3*C23 --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- -Security measures --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Network operations: network management; network monitoring; public networks --- Security measures. --- 681.3*C23 Network operations: network management; network monitoring; public networks --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 --- Computer networks&delete& --- Electronic commerce - Security measures --- Internet - Security measures --- Business enterprises - Computer networks - Security measures
Listing 1 - 10 of 21 | << page >> |
Sort by
|