Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 14 of 14 matches in All Departments
This book presents the most interesting talks given at ISSE 2015 - the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: * Encrypted Communication * Trust Services, eID and Cloud Security * Industrial Security and Internet of Things * Cybersecurity, Cybercrime, Critical Infrastructures * BYOD and Mobile Security * Regulation and Policies * Biometric Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2015.
This book presents the most interesting talks given at ISSE 2014 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.
This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Information Security Strategy; Enterprise and Cloud Computing Security - Security and Privacy Impact of Green Energy; Human Factors of IT Security - Solutions for Mobile Applications; Identity & Access Management - Trustworthy Infrastructures; Separation & Isolation - EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security - Hackers & Threats Target Group Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Distributed System and Information Security at Westfalische Hochschule Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT
This book presents the most interesting talks given at ISSE 2011 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Computing & Enterprise Security Services - Awareness, Education, Privacy & Trustworthiness - Smart Grids, Mobile & Wireless Security - Security Management, Identity & Access Management - eID & eGovernment - Device & Network Security Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.
This book presents the most interesting talks given at ISSE 2010
the forum for the inter-disciplinary discussion of how to
adequately secure electronic business processes.
Dcar Readers, ENISA has oncc again co-organizcd rhc ISSE 2009, Information Sccur ity Solutions Europc Confcrcncc 2009 togcthcr with ccma, TclcTrusT, thc ' Idcntity 2009', and thc ciryof Thc Haguc. Thc purpe se of rhc ISSE has been to support thc dcvclopmc nt 01' a Europcan information sccunty cunu rc throughout thc ycars. This goa l is morc rhan cvcr valid fOT thc future of rhc Internet, with its cvcr increasing dcmand for ftrustwo rthy Ir applications for citizc ns, industry cross-bordcr framcw ork o and adm inistration. Thc ISSE is dcsigncd 10 mform le T profcssionals, kcy poliey makcrs and industry leaders on thc tates t dcvclopmcnts and trends in tcchno logy, as well as bcst practiccs. EN ISA ls highly co mmittcd to these targcts . as the Agcncy is pursuing a srrarcgy of mitigating risks through awarcness. srudics, rcpor ts and Position Papers on current NIS mancrs. In this quest, wc assist and advisc the Europcan Commission. Member Smtcs. and the busin css community in the ficld of Network and Information Sccu rity, The sccurity of communication nctworks and infonnation systcms is of incrcasing couccm . in particular for thc cconomy of Europc. Clcarly, coopcration is kcy to addrcss toda y 's - and tomorrow's -complcx in fonnation sccunty chanenges. Only by working more closcly togcthcr, can we generate ncw strarcgics to manage these problems."
This book presents the most interesting talks given at ISSE 2008
the forum for the interdisciplinary discussion of how to adequately
secure electronic business processes.
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
The Information Security Solutions Europe Conference (ISSE) was started in 1999 by EEMA and TeleTrusT with the support of the European Commission and the German Federal Minis try of Technology and Economics. Today the annual conference is a fixed event in every IT security professional's calendar. The aim of ISSE is to support the development of a Euro pean information security culture and especially a cross-border framework for trustworthy IT applications for citizens, industry and administration. Therefore, it is important to take into consideration both international developments and European regulations and to allow for the interdisciplinary character of the information security field. In the five years of its existence ISSE has thus helped shape the profile of this specialist area. The integration of security in IT applications was initially driven only by the actual security issues considered important by experts in the field; currently, however, the economic aspects of the corresponding solutions are the most important factor in deciding their success. ISSE offers a suitable podium for the discussion of the relationship between these considerations and for the presentation of the practical implementation of concepts with their technical, or ganisational and economic parameters."
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. Here the positions of the experts involved are very diverse: some strive for as much security as possible, others only for as much security as is necessary. The conference ISSE (Information Security Solutions Europe) is the outstanding forum for the interdisciplinary search for sustainable compromises and for the presentation of concepts which hold up in real life. This book offers the most recent papers in the area of strategies, technologies, applications and best practice.
Inspired by the Dutch sculptor Joseph Mendes da Costa (1863-1939) and Ernst Barlach (1870-1938), Hans Wewerka (1888-1915) conquered the realm of figurative sculpture while he was still a student in Hoehr, an unusual discipline among the area's vernacular ceramics. He observed society outside [draussen in German], in all realms of public life, with great sensibility: gossip mongers, potato sellers, a dancing couple. Wewerka created likenesses taken from real life. His artistic approach and his acute awareness of form made him an exceptional creator of modern earthenware who had already gained international recognition during his lifetime. This first, comprehensive monograph featuring a catalogue of works documents Hans Wewerka's previously unknown career and traces his connections to modernist art, such as the Berlin Secession and artists like Rudolf Bosselt, Kathe Kollwitz, and Ernst Barlach. Text in English and German.
Dieses Lehrbuch gibt Ihnen einen UEberblick uber die Themen der IT-Sicherheit Die digitale Transformation eroeffnet viele neue Moeglichkeiten, den dadurch lassen sich Geschaftsmodelle und Verwaltungsprozesse radikal verandern. Aber mit fortschreitender Digitalisierung nimmt jedoch die Komplexitat der IT-Systeme- und Infrastrukturen zu. Zudem werden die Methoden der professionellen Angreifer ausgefeilter und die Angriffsziele kontinuierlich lukrativer, insgesamt fuhrt dies bei Unternehmen und der Gesellschaft zu hohen Schaden. Fur eine erfolgreiche Zukunft unserer Gesellschaft ist es daher entscheidend, diesen gestiegenen Risiken entgegenzuwirken und eine sichere sowie vertrauenswurdige IT zu gestalten. Von daher ist es notwendig, dass mit den wachsenden Herausforderungen auch neue Entwicklungen und Prozessen in der Cyber-Sicherheit einhergehen. Was sich hier getan hat koennen Sie in der 2. Auflage des Lehrbuchs 'Cyber-Sicherheit', von Prof. Norbert Pohlmann, nachlesen. Denn in der UEberarbeitung der sehr erfolgreichen Erst-Auflage wurden die bestehenden Kapitel erganzt und aktualisiert sowie zusatzlich fur neue Themen weitere Kapitel hinzugefugt. Aber auch Lehrmaterialien, wie 19 komplette Vorlesungen und UEberbungen auf den Webseiten wurden angepasst und erweitert. Auf insgesamt 746 Seiten bietet Informatikprofessor Norbert Pohlmann grundlegendes Wissen uber die Cyber-Sicherheit und geht bei innovativen Themen, wie Self Sovereign Identity oder dem Vertrauenswurdigkeits-Modell, detailliert in die Tiefe. Dabei ist dem Autor wichtig, nicht nur theoretisches Fachwissen zu vermitteln, sondern auch den Leser in die Lage zu versetzen, die Cyber-Sicherheit aus der anwendungsorientierten Perspektive zu betrachten. Lernen Sie mithilfe dieses Lehrbuchs mehr uber Mechanismen, Prinzipien, Konzepte und Eigenschaften von Cyber-Sicherheitssystemen. So sind Sie in der Lage, die Sicherheit und Vertrauenswurdigkeit von IT-Loesungen zu beurteilen. Grundlegende Aspekte der Cyber-Sicherheit Im einfuhrenden Abschnitt werden den Lesenden die Grundlagen der IT-Sicherheit vermittelt: * Cyber-Sicherheitsstrategien * Motivationen von Angreifern * Sicherheitsbedurfnisse der Burger und Mitarbeiter von Unternehmen * Aktuelle Cyber-Sicherheitsprobleme * Herausforderungen fur eine sicher und vertrauenswurdige digitale Zukunft * Wirksamkeitskonzepte von Cyber-Sicherheitsmechanismen Detaillierte Darstellung relevanter Systeme, Prozesse und Prinzipien In den weiteren Kapiteln wird auf besonders relevante Teilbereiche der Cyber-Sicherheit fokussiert: * Kryptographie * Hardware-Sicherheitsmodule zum Schutz von sicherheitsrelevanten Informationen * Digitale Signatur, elektronische Zertifikate sowie PKIs und PKAs * Identifikation und Authentifikation * Enterprise Identity und Access Management * Trusted Computing * Cyber-Sicherheit Fruhwarn- und Lagebildsysteme * Firewall-Systeme * E-Mail-Sicherheit * Blockchain-Technologie * Kunstliche Intelligenz und Cyber-Security * Social Web Cyber-Sicherheit * Self-Sovereign Identity (SSI) - neu * Vertrauen und Vertrauenswurdigkeit - neu * Weitere Aspekte der Cyber-Sicherheit - neu Zudem erfahren Sie mehr uber neue Standards und Methoden bei IPSec-Verschlusselung, Transport Layer Security (TLS) sowie Sicherheitsmassnahmen gegen DDoS-Angriffe. Anschauliche Grafiken und Tabellen bilden Prozesse und Zusammenhange verstandlich ab. Didaktisch gut aufbereitet, koennen Sie die Inhalte mit zahlreichen neuen UEbungsaufgaben vertiefen. Das Lehrbuch richtet sich insbesondere an Lesende, fur die ein umfassendes Know-how zu Cyber-Security im Arbeits-, Lehr- oder Privatumfeld relevant und interessant ist: * Studierende der Informatik, IT- oder Cyber-Sicherheit, aber auch angrenzende Disziplinen * Auszubildende im Bereich Fachinformatik, digitale Medien * Mitarbeitende/Fuhrungspersonen aller Branchen, die sich mit Digitalisierung beschaftigen Die zweite Auflage des Lehrbuchs Cyber-Sicherheit von Prof. Norbert Pohlmann wurde umfassend uberarbeitet, aktualisiert und um drei neue Kapitel sowie ein Glossar erweitert.
This book presents the most interesting talks given at ISSE 2013 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.
|
You may like...
Amanda and the Lost Time (Afrikaans…
Shelley Admont, Kidkiddos Books
Hardcover
R660
Discovery Miles 6 600
Isikhumba Esikuso - Umgubho Wokuguquka…
Sindiwe Magona, Nina G. Jablonski
Paperback
R168
Discovery Miles 1 680
Corey Shares A Secret! A Mental Health…
Ronnette Smith-Powell, Destiny Powell
Hardcover
|