Details

ISSE 2013 Securing Electronic Business Processes


ISSE 2013 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2013 Conference

von: Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider

CHF 59.00

Verlag: Springer Vieweg
Format: PDF
Veröffentl.: 11.10.2013
ISBN/EAN: 9783658033712
Sprache: englisch
Anzahl Seiten: 282

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<p>This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:</p><p>- Cloud Security, Trust Services, eId &amp; Access Management</p><p>- Human Factors, Awareness &amp; Privacy, Regulations and Policies</p><p>- Security Management</p><p>- Cyber Security, Cybercrime, Critical Infrastructures</p><p>- Mobile Security &amp; Applications</p><p>Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.</p>
<p>Cloud Security, Trust Services, eId &amp; Access Management.- Human Factors, Awareness &amp; Privacy, Regulations and Policies.- Security Management.- Cyber Security, Cybercrime, Critical Infrastructures.- Mobile Security &amp; Applications.</p>
<p>Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen</p><p>Helmut Reimer: Senior Consultant, TeleTrusT</p><p>Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT</p>
<p>This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:</p><p>- Cloud Security, Trust Services, eId &amp; Access Management</p><p>- Human Factors, Awareness &amp; Privacy, Regulations and Policies</p><p>- Security Management</p><p>- Cyber Security, Cybercrime, Critical Infrastructures</p><p>- Mobile Security &amp; Applications</p><p>Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.</p><p> </p><p>Content</p><p>Cloud Security, Trust Services, eId &amp; Access Management - Human Factors, Awareness &amp; Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security &amp; Applications</p><p> </p><p>Target Groups</p><p>Developers of Electronic Business Processes</p><p>IT Managers</p><p>IT Security Experts</p><p>Researchers</p><p> </p><p>Editors</p><p>Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen</p><p>Helmut Reimer: Senior Consultant, TeleTrusT</p><p>Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT</p>
The most interesting talks given at ISSE 2013 State-of-the-art: best papers How to adequately secure electronic business processes Includes supplementary material: sn.pub/extras
<p>This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:</p><p>- Cloud Security, Trust Services, eId &amp; Access Management</p><p>- Human Factors, Awareness &amp; Privacy, Regulations and Policies</p><p>- Security Management</p><p>- Cyber Security, Cybercrime, Critical Infrastructures</p><p>- Mobile Security &amp; Applications</p><p>Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.</p>

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
CHF 118.00
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
CHF 118.00