0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (14)
  • R2,500 - R5,000 (10)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 25 of 26 matches in All Departments

The Future of Identity in the Information Society - Challenges and Opportunities (Hardcover, 2009 ed.): Kai Rannenberg, Denis... The Future of Identity in the Information Society - Challenges and Opportunities (Hardcover, 2009 ed.)
Kai Rannenberg, Denis Royer, Andre Deuker
R5,734 Discovery Miles 57 340 Ships in 10 - 15 working days

Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources.

This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime.

"FIDIS has put Europe on the global map as a place for high quality identity management research." V. Reding, Commissioner, Responsible for Information Society and Media (EU)"

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010,... Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 Ed.)
Kai Rannenberg, Vijay Varadharajan, Christian Weber
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.

Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover): Kai Rannenberg, Jan Camenisch, Ahmad... Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R3,573 Discovery Miles 35 730 Ships in 12 - 17 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September... ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Marko Hoelbl, Kai Rannenberg, Tatjana Welzer
R3,347 Discovery Miles 33 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference... Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (Hardcover, 2006 ed.)
Simone Fischer-Hubner, Kai Rannenberg, Louise Yngstroem, Stefan Lindskog
R4,478 Discovery Miles 44 780 Ships in 12 - 17 working days

This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments." The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.

Advancing Research in Information and Communication Technology - IFIP's Exciting First 60+ Years, Views from the Technical... Advancing Research in Information and Communication Technology - IFIP's Exciting First 60+ Years, Views from the Technical Committees and Working Groups (Hardcover, 1st ed. 2021)
Michael Goedicke, Erich Neuhold, Kai Rannenberg
R3,341 Discovery Miles 33 410 Ships in 10 - 15 working days

For 60 years the International Federation for Information Processing (IFIP) has been advancing research in Information and Communication Technology (ICT). This book looks into both past experiences and future perspectives using the core of IFIP's competence, its Technical Committees (TCs) and Working Groups (WGs). Soon after IFIP was founded, it established TCs and related WGs to foster the exchange and development of the scientific and technical aspects of information processing. IFIP TCs are as diverse as the different aspects of information processing, but they share the following aims: To establish and maintain liaison with national and international organizations with allied interests and to foster cooperative action, collaborative research, and information exchange. To identify subjects and priorities for research, to stimulate theoretical work on fundamental issues, and to foster fundamental research which will underpin future development. To provide a forum for professionals with a view to promoting the study, collection, exchange, and dissemination of ideas, information, and research findings and thereby to promote the state of the art. To seek and use the most effective ways of disseminating information about IFIP's work including the organization of conferences, workshops and symposia and the timely production of relevant publications. To have special regard for the needs of developing countries and to seek practicable ways of working with them. To encourage communication and to promote interaction between users, practitioners, and researchers. To foster interdisciplinary work and - in particular - to collaborate with other Technical Committees and Working Groups. The 17 contributions in this book describe the scientific, technical, and further work in TCs and WGs and in many cases also assess the future consequences of the work's results. These contributions explore the developments of IFIP and the ICT profession now and over the next 60 years. The contributions are arranged per TC and conclude with the chapter on the IFIP code of ethics and conduct.

ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September... ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Paperback, 1st ed. 2020)
Marko Hoelbl, Kai Rannenberg, Tatjana Welzer
R3,318 Discovery Miles 33 180 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13-14, 2019, Proceedings (Paperback,... Privacy Technologies and Policy - 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13-14, 2019, Proceedings (Paperback, 1st ed. 2019)
Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications.

Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected... Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.

Attribute-based Credentials for Trust - Identity in the Information Society (Paperback, Softcover reprint of the original 1st... Attribute-based Credentials for Trust - Identity in the Information Society (Paperback, Softcover reprint of the original 1st ed. 2015)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R3,908 Discovery Miles 39 080 Ships in 10 - 15 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

Privacy and Identity Management for Life (Paperback, 2011 ed.): Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg Privacy and Identity Management for Life (Paperback, 2011 ed.)
Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg
R4,299 Discovery Miles 42 990 Ships in 10 - 15 working days

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.

Privacy and Identity Management for Life (Hardcover, 2011 ed.): Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg Privacy and Identity Management for Life (Hardcover, 2011 ed.)
Jan Camenisch, Simone Fischer-Hubner, Kai Rannenberg
R4,328 Discovery Miles 43 280 Ships in 10 - 15 working days

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.

Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference... Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Simone Fischer-Hubner, Kai Rannenberg, Louise Yngstroem, Stefan Lindskog
R4,291 Discovery Miles 42 910 Ships in 10 - 15 working days

The IT environment now includes novel, dynamic approaches such as mobility, wearability, ubiquity, ad hoc use, mind/body orientation, and business/ market orientation. This modern environment challenges the whole information security research community to focus on interdisciplinary and holistic approaches while retaining the benefit of previous research efforts. This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments." The papers in this have a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.

The Future of Identity in the Information Society - Challenges and Opportunities (Paperback, Softcover reprint of hardcover 1st... The Future of Identity in the Information Society - Challenges and Opportunities (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Kai Rannenberg, Denis Royer, Andre Deuker
R5,494 Discovery Miles 54 940 Ships in 10 - 15 working days

Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources.

This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime.

"FIDIS has put Europe on the global map as a place for high quality identity management research." -V. Reding, Commissioner, Responsible for Information Society and Media (EU)

Event-Driven Mobile Financial Information Services 2008 - Design of an Intraday Decision Support System (Paperback, 2008 ed.):... Event-Driven Mobile Financial Information Services 2008 - Design of an Intraday Decision Support System (Paperback, 2008 ed.)
Jan Muntermann; Foreword by Kai Rannenberg
R1,441 Discovery Miles 14 410 Ships in 10 - 15 working days

Jan Muntermann presents an intraday event study that is conducted within the German capital market, and provides evidence that investors could exploit intraday stock price effects following critical market events. He then develops the concept for a corresponding mobile decision support system that assists investors in identifying those events. Based on the design science research paradigm, he uses this concept in the design of a novel mobile decision support system, which can provide ubiquitous information access to private investors.

Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October ... Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings (Paperback, 2. Aufl.)
Hiroaki Kikuchi, Kai Rannenberg
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Security, IWSEC 2007, held in Nara, Japan, October 29-31, 2007.

The 30 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, E-commerce and Voting, Operating systems, Security and Information management, Anonymity and Privacy and Digital signatures, Hash function and Protocol.

Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October... Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings (Paperback, 2006 ed.)
Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions.

Advancing Research in Information and Communication Technology - IFIP's Exciting First 60+ Years, Views from the Technical... Advancing Research in Information and Communication Technology - IFIP's Exciting First 60+ Years, Views from the Technical Committees and Working Groups (Paperback, 1st ed. 2021)
Michael Goedicke, Erich Neuhold, Kai Rannenberg
R3,311 Discovery Miles 33 110 Ships in 10 - 15 working days

For 60 years the International Federation for Information Processing (IFIP) has been advancing research in Information and Communication Technology (ICT). This book looks into both past experiences and future perspectives using the core of IFIP's competence, its Technical Committees (TCs) and Working Groups (WGs). Soon after IFIP was founded, it established TCs and related WGs to foster the exchange and development of the scientific and technical aspects of information processing. IFIP TCs are as diverse as the different aspects of information processing, but they share the following aims: To establish and maintain liaison with national and international organizations with allied interests and to foster cooperative action, collaborative research, and information exchange. To identify subjects and priorities for research, to stimulate theoretical work on fundamental issues, and to foster fundamental research which will underpin future development. To provide a forum for professionals with a view to promoting the study, collection, exchange, and dissemination of ideas, information, and research findings and thereby to promote the state of the art. To seek and use the most effective ways of disseminating information about IFIP's work including the organization of conferences, workshops and symposia and the timely production of relevant publications. To have special regard for the needs of developing countries and to seek practicable ways of working with them. To encourage communication and to promote interaction between users, practitioners, and researchers. To foster interdisciplinary work and - in particular - to collaborate with other Technical Committees and Working Groups. The 17 contributions in this book describe the scientific, technical, and further work in TCs and WGs and in many cases also assess the future consequences of the work's results. These contributions explore the developments of IFIP and the ICT profession now and over the next 60 years. The contributions are arranged per TC and conclude with the chapter on the IFIP code of ethics and conduct.

Privacy Technologies and Policy - 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings (Paperback,... Privacy Technologies and Policy - 9th Annual Privacy Forum, APF 2021, Oslo, Norway, June 17-18, 2021, Proceedings (Paperback, 1st ed. 2021)
Nils Gruschka, Luis Filipe Coelho Antunes, Kai Rannenberg, Prokopios Drogkaris
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 9th Annual Privacy Forum, APF 2021. Due to COVID-19 pandemic the conference was held virtually. The 9 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on Implementing Personal Data Processing Principles; Privacy Enhancing Technologies; Promoting Compliance with the GDPR.

Privacy Technologies and Policy - 8th Annual Privacy Forum, APF 2020, Lisbon, Portugal, October 22-23, 2020, Proceedings... Privacy Technologies and Policy - 8th Annual Privacy Forum, APF 2020, Lisbon, Portugal, October 22-23, 2020, Proceedings (Paperback, 1st ed. 2020)
Luis Antunes, Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Prokopios Drogkaris
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 8th Annual Privacy Forum, APF 2020, held in Lisbon, Portugal, in October 2020. The 12 revised full papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on impact assessment; privacy by design; data protection and security; and transparency.

Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers... Privacy Technologies and Policy - 5th Annual Privacy Forum, APF 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Erich Schweighofer, Herbert Leitold, Andreas Mitrakas, Kai Rannenberg
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, "Data Protection Regulation", discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, "Neutralisation and Anonymization", discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, "Privacy Policies in Practice", discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.

Privacy Technologies  and Policy - 10th Annual Privacy Forum, APF 2022, Warsaw, Poland, June 23-24, 2022, Proceedings... Privacy Technologies and Policy - 10th Annual Privacy Forum, APF 2022, Warsaw, Poland, June 23-24, 2022, Proceedings (Paperback, 1st ed. 2022)
Agnieszka Gryszczynska, Przemyslaw Polanski, Nils Gruschka, Kai Rannenberg, Monika Adamczyk
R1,412 Discovery Miles 14 120 Ships in 12 - 17 working days

This book constitutes the refereed conference proceedings of the 10th Annual Privacy Forum, APF 2022 in Warsaw, Poland in June 2022. The 8 full papers were carefully reviewed and selected from 38 submissions. The papers are organized in the area of privacy and data protection while focusing on privacy related application areas. A large focus of the 2022 conference was on the General Data Protection Regulation (GDPR).

Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings... Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Stefan Schiffner, Jetzabel Serna, Demosthenes Ikonomou, Kai Rannenberg
R2,048 Discovery Miles 20 480 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 4th Annual Privacy Forum, APF 2016, held in Frankfurt/Main, Germany, in September 2016. The 12 revised full papers presented in this volume were carefully reviewed and selected from 32 submissions. The papers are organized in three sessions: eIDAS and data protection regulation; IoT and public clouds; and privacy policies and privacy risk presentation.

Verfassliche Informationssysteme - It-Sicherheit an Der Schwelle Des Neuen Jahrtausends (German, Paperback, Softcover Reprint... Verfassliche Informationssysteme - It-Sicherheit an Der Schwelle Des Neuen Jahrtausends (German, Paperback, Softcover Reprint of the Original 1st 1999 ed.)
Rainer Baumgart, Kai Rannenberg, Dieter Wahner, Gerhard Weck
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

Mit dem Beginn des neuen Jahrtausends werden die Themen um die Verlasslichkeit komplexer, vernetzter Systeme so virulent wie nie zuvor. Es sind Konzepte und Losungswege gefragt, die sich in einer global vernetzten IT-Umgebung bewahren und gleichzeitig offen sind fur Erweiterungen, mit denen neuen Herausforderungen an die IT-Sicherheit gegegnet werden kann. Im einzelnen geht es insbesondere um die folgenden sicherheitskritischen Themenbereiche: Elektronischer Handel, Virtualisierung des Geldes, rechtlich wirksame Geschaftsablaufe, Digitale Signaturen. Es geht ferner um Fragen des Copyrights im Zeitalter elektronisch verfugbarer Dokumente, neue Techniken bei der Nutzung des Internets zur Realisierung sicherer Kommunikation, schliesslich um die Vernetzung in extrem sicherheitssensitiven Bereichen wie z.B. bei der medizinischen Versorgung.
Das Buch ist Ergebnis und Arbeitsgrundlage der GI-Tagung "VIS99 - Verlassliche IT-Systeme," die vom 22-24. September 1999 in Essen stattgefunden hat.
"

Zertifizierung Mehrseitiger It-Sicherheit - Kriterien Und Organisatorische Rahmenbedingungen (German, Paperback, 1998 ed.): Kai... Zertifizierung Mehrseitiger It-Sicherheit - Kriterien Und Organisatorische Rahmenbedingungen (German, Paperback, 1998 ed.)
Kai Rannenberg
R1,320 Discovery Miles 13 200 Ships in 10 - 15 working days

Zertifizierung und Evaluation von IT-Sicherheit gewinnen mehr und mehr Bedeutung, nicht zuletzt durch einschlagige Bestimmungen des neuen deutschen Gesetzes zur digitalen Signatur.
Dieses Buch gibt aus unabhangiger Perspektive einen Uberblick uber Stand, Entwicklung und Kriterien der IT-Sicherheitszertifizierung. Es stellt herkommlicher IT-Sicherheit, die vor allem das Interesse der Systembetreiber im Blickfeld hatte, mehrseitige IT-Sicherheit gegenuber, also den gleichberechtigten Schutz von Nutzern und Kunden.
Auf der Basis neuer Erfahrungen werden zusatzlich die Organisation von IT-Sicherheitszertifizierung und -evaluation untersucht und Vorschlage zur Steigerung ihrer Effizienz entwickelt.
Dieses Buch nutzt besonders Beschaffern, Betreibern und Verwaltern von IT-Systemen sowie Datenschutz- und Sicherheitsverantwortlichen und gibt ihnen u.a. die Moglichkeit, bei einer Kaufentscheidung die ihnen prasentierten Zertifikate besser einzuordnen. Produkt- und Systementwickler bekommen Einblick in Ziele und Ablauf der IT-Sicherheitszertifizierung."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safari Nation - A Social History Of The…
Jacob Dlamini Paperback R320 R250 Discovery Miles 2 500
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, … Paperback R350 R273 Discovery Miles 2 730
Breaking Bread - A Memoir
Jonathan Jansen Paperback R330 R220 Discovery Miles 2 200
Emigreer Of Bly - Is Die Gras Werklik…
Stephan Joubert Paperback R220 R189 Discovery Miles 1 890
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, … Paperback R350 R301 Discovery Miles 3 010
Nation On The Couch - Inside South…
Wahbie Long Paperback R335 R288 Discovery Miles 2 880
Braai
Reuben Riffel Paperback R495 R359 Discovery Miles 3 590
Being Black - A South African Story That…
Theo Mayekiso Paperback R297 Discovery Miles 2 970
Kingdom Of Daylight - Memories Of A…
Peter Steyn Paperback  (2)
R153 Discovery Miles 1 530
Women In Solitary - Inside The Female…
Shanthini Naidoo Paperback  (1)
R355 R305 Discovery Miles 3 050

 

Partners