0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (12)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference (Paperback, 1st ed. 2015): Helmut Reimer,... ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference (Paperback, 1st ed. 2015)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R2,476 Discovery Miles 24 760 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2015 - the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: * Encrypted Communication * Trust Services, eID and Cloud Security * Industrial Security and Internet of Things * Cybersecurity, Cybercrime, Critical Infrastructures * BYOD and Mobile Security * Regulation and Policies * Biometric Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2015.

ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference... ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference (Paperback, 2014 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R2,336 Discovery Miles 23 360 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2014 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.

ISSE 2012  Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2012 Conference... ISSE 2012 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2012 Conference (Paperback, 2013 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Information Security Strategy; Enterprise and Cloud Computing Security - Security and Privacy Impact of Green Energy; Human Factors of IT Security - Solutions for Mobile Applications; Identity & Access Management - Trustworthy Infrastructures; Separation & Isolation - EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security - Hackers & Threats Target Group Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Distributed System and Information Security at Westfalische Hochschule Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT

ISSE 2011 Securing Electronic Business Processes 2012 - Highlights of the Information Security Solutions Europe 2011 Conference... ISSE 2011 Securing Electronic Business Processes 2012 - Highlights of the Information Security Solutions Europe 2011 Conference (Paperback, 2011 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2011 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Computing & Enterprise Security Services - Awareness, Education, Privacy & Trustworthiness - Smart Grids, Mobile & Wireless Security - Security Management, Identity & Access Management - eID & eGovernment - Device & Network Security Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.

ISSE 2010 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2010 Conference... ISSE 2010 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2010 Conference (Paperback, 2011 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2010 the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes.
The topics include:
- Identity and Security Management
- Technical and Economical Aspects of Cloud Security
- Security Services and Large Scale Public Applications
- Smart Grid Security and Emerging Security Solutions
- Privacy and Data Protection
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2010.

ISSE 2009 Securing Electronic Business Processes 2010 - Highlights of the Information Security Solutions Europe 2009 Conference... ISSE 2009 Securing Electronic Business Processes 2010 - Highlights of the Information Security Solutions Europe 2009 Conference (Paperback, 2010 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R2,828 Discovery Miles 28 280 Ships in 10 - 15 working days

Dcar Readers, ENISA has oncc again co-organizcd rhc ISSE 2009, Information Sccur ity Solutions Europc Confcrcncc 2009 togcthcr with ccma, TclcTrusT, thc ' Idcntity 2009', and thc ciryof Thc Haguc. Thc purpe se of rhc ISSE has been to support thc dcvclopmc nt 01' a Europcan information sccunty cunu rc throughout thc ycars. This goa l is morc rhan cvcr valid fOT thc future of rhc Internet, with its cvcr increasing dcmand for ftrustwo rthy Ir applications for citizc ns, industry cross-bordcr framcw ork o and adm inistration. Thc ISSE is dcsigncd 10 mform le T profcssionals, kcy poliey makcrs and industry leaders on thc tates t dcvclopmcnts and trends in tcchno logy, as well as bcst practiccs. EN ISA ls highly co mmittcd to these targcts . as the Agcncy is pursuing a srrarcgy of mitigating risks through awarcness. srudics, rcpor ts and Position Papers on current NIS mancrs. In this quest, wc assist and advisc the Europcan Commission. Member Smtcs. and the busin css community in the ficld of Network and Information Sccu rity, The sccurity of communication nctworks and infonnation systcms is of incrcasing couccm . in particular for thc cconomy of Europc. Clcarly, coopcration is kcy to addrcss toda y 's - and tomorrow's -complcx in fonnation sccunty chanenges. Only by working more closcly togcthcr, can we generate ncw strarcgics to manage these problems."

Future of Trust in Computing 2009 - Proceedings of the First International Conference Future of Trust in Computing 2008... Future of Trust in Computing 2009 - Proceedings of the First International Conference Future of Trust in Computing 2008 (Paperback, 2009 ed.)
David Grawrock, Helmut Reimer, Ahmad-Reza Sadeghi, Claire Vishik
R621 Discovery Miles 6 210 Ships in 10 - 15 working days

The concept of trust is related to many aspects of our daily lives, and different stakeholders use the term "trust" in various contexts. Trust is crucial in today's information societies for ensuring success of digital economies in all countries and regions. This book contains papers that were presented at the conference "Future of Trust in Computing" and brings together academics, regulators, technologists, and practitioners working in diverse areas of trust from various parts of the world. The authors discuss issues they are facing and begin to form a common framework. Security and privacy threats and remedies, core trust-enforcing technologies, innovative applications, regulatory issues, privacy and usability, economics as well as provable security and assurance are discussed. Finally, a number of papers touch upon innovative approaches to trust that begin to define new fields of research and innovative types of technologies.

ISSE 2008 Securing Electronic Business Processes 2009 - Highlights of the Information Security Solutions Europe 2008 Conference... ISSE 2008 Securing Electronic Business Processes 2009 - Highlights of the Information Security Solutions Europe 2008 Conference (Paperback, 2009 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2008 the forum for the interdisciplinary discussion of how to adequately secure electronic business processes.
The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.

ISSE/SECURE 2007 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe/Secure 2007... ISSE/SECURE 2007 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe/Secure 2007 Conference (Paperback, 2007 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.

ISSE 2006 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2006 Conference... ISSE 2006 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2006 Conference (Paperback, 2006 ed.)
Paulus Sachar, Norbert Pohlmann, Helmut Reimer
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.

ISSE 2004 - Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2004 Conference... ISSE 2004 - Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2004 Conference (Paperback, 2004 ed.)
Sacher Paulus, Norbert Pohlmann, Helmut Reimer
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

The Information Security Solutions Europe Conference (ISSE) was started in 1999 by EEMA and TeleTrusT with the support of the European Commission and the German Federal Minis try of Technology and Economics. Today the annual conference is a fixed event in every IT security professional's calendar. The aim of ISSE is to support the development of a Euro pean information security culture and especially a cross-border framework for trustworthy IT applications for citizens, industry and administration. Therefore, it is important to take into consideration both international developments and European regulations and to allow for the interdisciplinary character of the information security field. In the five years of its existence ISSE has thus helped shape the profile of this specialist area. The integration of security in IT applications was initially driven only by the actual security issues considered important by experts in the field; currently, however, the economic aspects of the corresponding solutions are the most important factor in deciding their success. ISSE offers a suitable podium for the discussion of the relationship between these considerations and for the presentation of the practical implementation of concepts with their technical, or ganisational and economic parameters."

Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2003 Conference (Paperback,... Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2003 Conference (Paperback, 2004 ed.)
Paulus Sachar, Norbert Pohlmann, Helmut Reimer
R1,447 Discovery Miles 14 470 Ships in 10 - 15 working days

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. Here the positions of the experts involved are very diverse: some strive for as much security as possible, others only for as much security as is necessary.

The conference ISSE (Information Security Solutions Europe) is the outstanding forum for the interdisciplinary search for sustainable compromises and for the presentation of concepts which hold up in real life. This book offers the most recent papers in the area of strategies, technologies, applications and best practice.

ISSE 2013 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2013 Conference... ISSE 2013 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2013 Conference (Paperback, 2013 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2013 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:

- Cloud Security, Trust Services, eId & Access Management

- Human Factors, Awareness & Privacy, Regulations and Policies

- Security Management

- Cyber Security, Cybercrime, Critical Infrastructures

- Mobile Security & Applications

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.

Kommunikationssicherheit Im Zeichen Des Internet - Grundlagen, Strategien, Realisierungen, Anwendungen (German, Paperback,... Kommunikationssicherheit Im Zeichen Des Internet - Grundlagen, Strategien, Realisierungen, Anwendungen (German, Paperback, Softcover Reprint of the Original 1st 2001 ed.)
Patrick Horster, Helmut Reimer, Andreas Pfitzmann, Alexander Rossnagel, Karl Rihaczek
R2,559 Discovery Miles 25 590 Ships in 10 - 15 working days

Der Band zeigt den aktuellen Stand der Forschung und Entwicklung auf und prasentiert innovative Anwendungen. Durch das umfangreiche Spektrum an brandaktuellen, hochwertigen Beitragen kommt man an diesem Buch gewiss nicht vorbei - insbesondere nicht, wenn man das Thema unternehmensweiter Informationssicherheit als Herausforderung annehmen mochte."

Datenschutzaudit - Konzeption, Durchfuhrung, Gesetzliche Regelung (German, Paperback, 2000 ed.): Andreas Pfitzmann Datenschutzaudit - Konzeption, Durchfuhrung, Gesetzliche Regelung (German, Paperback, 2000 ed.)
Andreas Pfitzmann; Alexander Rossnagel; Edited by Helmut Reimer, Karl Rihaczek, Alexander Rossnagel
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

Das Datenschutzaudit ist ein neues, marktfoermiges Instrument des Datenschutzes. Es belohnt denjenigen, der Datenschutz und Datensicherheit fur seine Anwendung nachprufbar verbessert mit der Moeglichkeit, mit einem Datenschutzaudit-Zeichen zu werben. Das Buch prasentiert das uberarbeitete und erweiterte Gutachten fur das Bundeswirtschaftsministerium zur Konzipierung und gesetzlichen Einfuhrung eines Datenschutzaudits. Ausgehend vom Vorbild des Umweltschutzaudits beschreibt es Zielsetzungen, Kriterien, Verfahren, Beteiligte und Durchfuhrung eines Datenschutzaudits und bewertet dessen Vor- und Nachteile. Abschliessend skizziert das Buch die Inhalte eines Datenschutzaudit-Gesetzes.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Magic Looking Glass
Tom Percival Paperback R233 R198 Discovery Miles 1 980
1 Recce: Volume 3 - Through Stealth Our…
Alexander Strachan Paperback R360 R309 Discovery Miles 3 090
The Sky's the Limit
Olga McGrath Hardcover R755 Discovery Miles 7 550
History of Alexander the Great
Jacob Abbott Paperback R473 Discovery Miles 4 730
Braai
Reuben Riffel Paperback R495 R359 Discovery Miles 3 590
The Iliad
Homere Paperback R509 Discovery Miles 5 090
Madam & Eve: Family Meeting
Stephen Francis Paperback R220 R172 Discovery Miles 1 720
The Gnome Who Roamed - (White Early…
Heather Pindar Paperback R205 R166 Discovery Miles 1 660
The Ancient History of the Egyptians…
Charles Rollin Paperback R511 Discovery Miles 5 110
The Mystery of the Stinky Spooky Night
Fran Manushkin Paperback R188 R156 Discovery Miles 1 560

 

Partners