Details
ISSE 2013 Securing Electronic Business Processes
Highlights of the Information Security Solutions Europe 2013 Conference
CHF 59.00 |
|
Verlag: | Springer Vieweg |
Format: | |
Veröffentl.: | 11.10.2013 |
ISBN/EAN: | 9783658033712 |
Sprache: | englisch |
Anzahl Seiten: | 282 |
Dieses eBook enthält ein Wasserzeichen.
Beschreibungen
<p>This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:</p><p>- Cloud Security, Trust Services, eId & Access Management</p><p>- Human Factors, Awareness & Privacy, Regulations and Policies</p><p>- Security Management</p><p>- Cyber Security, Cybercrime, Critical Infrastructures</p><p>- Mobile Security & Applications</p><p>Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.</p>
<p>Cloud Security, Trust Services, eId & Access Management.- Human Factors, Awareness & Privacy, Regulations and Policies.- Security Management.- Cyber Security, Cybercrime, Critical Infrastructures.- Mobile Security & Applications.</p>
<p>Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen</p><p>Helmut Reimer: Senior Consultant, TeleTrusT</p><p>Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT</p>
<p>This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:</p><p>- Cloud Security, Trust Services, eId & Access Management</p><p>- Human Factors, Awareness & Privacy, Regulations and Policies</p><p>- Security Management</p><p>- Cyber Security, Cybercrime, Critical Infrastructures</p><p>- Mobile Security & Applications</p><p>Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.</p><p> </p><p>Content</p><p>Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications</p><p> </p><p>Target Groups</p><p>Developers of Electronic Business Processes</p><p>IT Managers</p><p>IT Security Experts</p><p>Researchers</p><p> </p><p>Editors</p><p>Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westphalian University of Applied Sciences Gelsenkirchen</p><p>Helmut Reimer: Senior Consultant, TeleTrusT</p><p>Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT</p>
The most interesting talks given at ISSE 2013 State-of-the-art: best papers How to adequately secure electronic business processes Includes supplementary material: sn.pub/extras
<p>This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:</p><p>- Cloud Security, Trust Services, eId & Access Management</p><p>- Human Factors, Awareness & Privacy, Regulations and Policies</p><p>- Security Management</p><p>- Cyber Security, Cybercrime, Critical Infrastructures</p><p>- Mobile Security & Applications</p><p>Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.</p>