0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (11)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 14 of 14 matches in All Departments

ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference (Paperback, 1st ed. 2015): Helmut Reimer,... ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference (Paperback, 1st ed. 2015)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R2,476 Discovery Miles 24 760 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2015 - the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: * Encrypted Communication * Trust Services, eID and Cloud Security * Industrial Security and Internet of Things * Cybersecurity, Cybercrime, Critical Infrastructures * BYOD and Mobile Security * Regulation and Policies * Biometric Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2015.

ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference... ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference (Paperback, 2014 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R2,336 Discovery Miles 23 360 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2014 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.

ISSE 2012  Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2012 Conference... ISSE 2012 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2012 Conference (Paperback, 2013 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Information Security Strategy; Enterprise and Cloud Computing Security - Security and Privacy Impact of Green Energy; Human Factors of IT Security - Solutions for Mobile Applications; Identity & Access Management - Trustworthy Infrastructures; Separation & Isolation - EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security - Hackers & Threats Target Group Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Distributed System and Information Security at Westfalische Hochschule Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT

ISSE 2011 Securing Electronic Business Processes 2012 - Highlights of the Information Security Solutions Europe 2011 Conference... ISSE 2011 Securing Electronic Business Processes 2012 - Highlights of the Information Security Solutions Europe 2011 Conference (Paperback, 2011 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2011 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Computing & Enterprise Security Services - Awareness, Education, Privacy & Trustworthiness - Smart Grids, Mobile & Wireless Security - Security Management, Identity & Access Management - eID & eGovernment - Device & Network Security Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.

ISSE 2010 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2010 Conference... ISSE 2010 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2010 Conference (Paperback, 2011 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2010 the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes.
The topics include:
- Identity and Security Management
- Technical and Economical Aspects of Cloud Security
- Security Services and Large Scale Public Applications
- Smart Grid Security and Emerging Security Solutions
- Privacy and Data Protection
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2010.

ISSE 2009 Securing Electronic Business Processes 2010 - Highlights of the Information Security Solutions Europe 2009 Conference... ISSE 2009 Securing Electronic Business Processes 2010 - Highlights of the Information Security Solutions Europe 2009 Conference (Paperback, 2010 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R2,828 Discovery Miles 28 280 Ships in 10 - 15 working days

Dcar Readers, ENISA has oncc again co-organizcd rhc ISSE 2009, Information Sccur ity Solutions Europc Confcrcncc 2009 togcthcr with ccma, TclcTrusT, thc ' Idcntity 2009', and thc ciryof Thc Haguc. Thc purpe se of rhc ISSE has been to support thc dcvclopmc nt 01' a Europcan information sccunty cunu rc throughout thc ycars. This goa l is morc rhan cvcr valid fOT thc future of rhc Internet, with its cvcr increasing dcmand for ftrustwo rthy Ir applications for citizc ns, industry cross-bordcr framcw ork o and adm inistration. Thc ISSE is dcsigncd 10 mform le T profcssionals, kcy poliey makcrs and industry leaders on thc tates t dcvclopmcnts and trends in tcchno logy, as well as bcst practiccs. EN ISA ls highly co mmittcd to these targcts . as the Agcncy is pursuing a srrarcgy of mitigating risks through awarcness. srudics, rcpor ts and Position Papers on current NIS mancrs. In this quest, wc assist and advisc the Europcan Commission. Member Smtcs. and the busin css community in the ficld of Network and Information Sccu rity, The sccurity of communication nctworks and infonnation systcms is of incrcasing couccm . in particular for thc cconomy of Europc. Clcarly, coopcration is kcy to addrcss toda y 's - and tomorrow's -complcx in fonnation sccunty chanenges. Only by working more closcly togcthcr, can we generate ncw strarcgics to manage these problems."

ISSE 2008 Securing Electronic Business Processes 2009 - Highlights of the Information Security Solutions Europe 2008 Conference... ISSE 2008 Securing Electronic Business Processes 2009 - Highlights of the Information Security Solutions Europe 2008 Conference (Paperback, 2009 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2008 the forum for the interdisciplinary discussion of how to adequately secure electronic business processes.
The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.

ISSE/SECURE 2007 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe/Secure 2007... ISSE/SECURE 2007 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe/Secure 2007 Conference (Paperback, 2007 ed.)
Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.

ISSE 2006 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2006 Conference... ISSE 2006 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2006 Conference (Paperback, 2006 ed.)
Paulus Sachar, Norbert Pohlmann, Helmut Reimer
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.

ISSE 2004 - Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2004 Conference... ISSE 2004 - Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2004 Conference (Paperback, 2004 ed.)
Sacher Paulus, Norbert Pohlmann, Helmut Reimer
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

The Information Security Solutions Europe Conference (ISSE) was started in 1999 by EEMA and TeleTrusT with the support of the European Commission and the German Federal Minis try of Technology and Economics. Today the annual conference is a fixed event in every IT security professional's calendar. The aim of ISSE is to support the development of a Euro pean information security culture and especially a cross-border framework for trustworthy IT applications for citizens, industry and administration. Therefore, it is important to take into consideration both international developments and European regulations and to allow for the interdisciplinary character of the information security field. In the five years of its existence ISSE has thus helped shape the profile of this specialist area. The integration of security in IT applications was initially driven only by the actual security issues considered important by experts in the field; currently, however, the economic aspects of the corresponding solutions are the most important factor in deciding their success. ISSE offers a suitable podium for the discussion of the relationship between these considerations and for the presentation of the practical implementation of concepts with their technical, or ganisational and economic parameters."

Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2003 Conference (Paperback,... Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2003 Conference (Paperback, 2004 ed.)
Paulus Sachar, Norbert Pohlmann, Helmut Reimer
R1,447 Discovery Miles 14 470 Ships in 10 - 15 working days

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. Here the positions of the experts involved are very diverse: some strive for as much security as possible, others only for as much security as is necessary.

The conference ISSE (Information Security Solutions Europe) is the outstanding forum for the interdisciplinary search for sustainable compromises and for the presentation of concepts which hold up in real life. This book offers the most recent papers in the area of strategies, technologies, applications and best practice.

Hans Wewerka Outdoors - Draussen - Stoneware Street Scenes / Strassenszenen in Steinzeug (English, German, Hardcover):... Hans Wewerka Outdoors - Draussen - Stoneware Street Scenes / Strassenszenen in Steinzeug (English, German, Hardcover)
Kreisverwaltung Des Westerwaldkreises, Nele Wieringen, Wewerka Archiv, Norbert Pohlmann, Katharina Uhl
R950 Discovery Miles 9 500 Ships in 12 - 17 working days

Inspired by the Dutch sculptor Joseph Mendes da Costa (1863-1939) and Ernst Barlach (1870-1938), Hans Wewerka (1888-1915) conquered the realm of figurative sculpture while he was still a student in Hoehr, an unusual discipline among the area's vernacular ceramics. He observed society outside [draussen in German], in all realms of public life, with great sensibility: gossip mongers, potato sellers, a dancing couple. Wewerka created likenesses taken from real life. His artistic approach and his acute awareness of form made him an exceptional creator of modern earthenware who had already gained international recognition during his lifetime. This first, comprehensive monograph featuring a catalogue of works documents Hans Wewerka's previously unknown career and traces his connections to modernist art, such as the Berlin Secession and artists like Rudolf Bosselt, Kathe Kollwitz, and Ernst Barlach. Text in English and German.

Cyber-Sicherheit - Das Lehrbuch fur Konzepte, Prinzipien, Mechanismen, Architekturen und  Eigenschaften von... Cyber-Sicherheit - Das Lehrbuch fur Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung (German, Paperback, 2. Aufl. 2022)
Norbert Pohlmann
R878 Discovery Miles 8 780 Ships in 12 - 17 working days

Dieses Lehrbuch gibt Ihnen einen UEberblick uber die Themen der IT-Sicherheit Die digitale Transformation eroeffnet viele neue Moeglichkeiten, den dadurch lassen sich Geschaftsmodelle und Verwaltungsprozesse radikal verandern. Aber mit fortschreitender Digitalisierung nimmt jedoch die Komplexitat der IT-Systeme- und Infrastrukturen zu. Zudem werden die Methoden der professionellen Angreifer ausgefeilter und die Angriffsziele kontinuierlich lukrativer, insgesamt fuhrt dies bei Unternehmen und der Gesellschaft zu hohen Schaden. Fur eine erfolgreiche Zukunft unserer Gesellschaft ist es daher entscheidend, diesen gestiegenen Risiken entgegenzuwirken und eine sichere sowie vertrauenswurdige IT zu gestalten. Von daher ist es notwendig, dass mit den wachsenden Herausforderungen auch neue Entwicklungen und Prozessen in der Cyber-Sicherheit einhergehen. Was sich hier getan hat koennen Sie in der 2. Auflage des Lehrbuchs 'Cyber-Sicherheit', von Prof. Norbert Pohlmann, nachlesen. Denn in der UEberarbeitung der sehr erfolgreichen Erst-Auflage wurden die bestehenden Kapitel erganzt und aktualisiert sowie zusatzlich fur neue Themen weitere Kapitel hinzugefugt. Aber auch Lehrmaterialien, wie 19 komplette Vorlesungen und UEberbungen auf den Webseiten wurden angepasst und erweitert. Auf insgesamt 746 Seiten bietet Informatikprofessor Norbert Pohlmann grundlegendes Wissen uber die Cyber-Sicherheit und geht bei innovativen Themen, wie Self Sovereign Identity oder dem Vertrauenswurdigkeits-Modell, detailliert in die Tiefe. Dabei ist dem Autor wichtig, nicht nur theoretisches Fachwissen zu vermitteln, sondern auch den Leser in die Lage zu versetzen, die Cyber-Sicherheit aus der anwendungsorientierten Perspektive zu betrachten. Lernen Sie mithilfe dieses Lehrbuchs mehr uber Mechanismen, Prinzipien, Konzepte und Eigenschaften von Cyber-Sicherheitssystemen. So sind Sie in der Lage, die Sicherheit und Vertrauenswurdigkeit von IT-Loesungen zu beurteilen. Grundlegende Aspekte der Cyber-Sicherheit Im einfuhrenden Abschnitt werden den Lesenden die Grundlagen der IT-Sicherheit vermittelt: * Cyber-Sicherheitsstrategien * Motivationen von Angreifern * Sicherheitsbedurfnisse der Burger und Mitarbeiter von Unternehmen * Aktuelle Cyber-Sicherheitsprobleme * Herausforderungen fur eine sicher und vertrauenswurdige digitale Zukunft * Wirksamkeitskonzepte von Cyber-Sicherheitsmechanismen Detaillierte Darstellung relevanter Systeme, Prozesse und Prinzipien In den weiteren Kapiteln wird auf besonders relevante Teilbereiche der Cyber-Sicherheit fokussiert: * Kryptographie * Hardware-Sicherheitsmodule zum Schutz von sicherheitsrelevanten Informationen * Digitale Signatur, elektronische Zertifikate sowie PKIs und PKAs * Identifikation und Authentifikation * Enterprise Identity und Access Management * Trusted Computing * Cyber-Sicherheit Fruhwarn- und Lagebildsysteme * Firewall-Systeme * E-Mail-Sicherheit * Blockchain-Technologie * Kunstliche Intelligenz und Cyber-Security * Social Web Cyber-Sicherheit * Self-Sovereign Identity (SSI) - neu * Vertrauen und Vertrauenswurdigkeit - neu * Weitere Aspekte der Cyber-Sicherheit - neu Zudem erfahren Sie mehr uber neue Standards und Methoden bei IPSec-Verschlusselung, Transport Layer Security (TLS) sowie Sicherheitsmassnahmen gegen DDoS-Angriffe. Anschauliche Grafiken und Tabellen bilden Prozesse und Zusammenhange verstandlich ab. Didaktisch gut aufbereitet, koennen Sie die Inhalte mit zahlreichen neuen UEbungsaufgaben vertiefen. Das Lehrbuch richtet sich insbesondere an Lesende, fur die ein umfassendes Know-how zu Cyber-Security im Arbeits-, Lehr- oder Privatumfeld relevant und interessant ist: * Studierende der Informatik, IT- oder Cyber-Sicherheit, aber auch angrenzende Disziplinen * Auszubildende im Bereich Fachinformatik, digitale Medien * Mitarbeitende/Fuhrungspersonen aller Branchen, die sich mit Digitalisierung beschaftigen Die zweite Auflage des Lehrbuchs Cyber-Sicherheit von Prof. Norbert Pohlmann wurde umfassend uberarbeitet, aktualisiert und um drei neue Kapitel sowie ein Glossar erweitert.

ISSE 2013 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2013 Conference... ISSE 2013 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2013 Conference (Paperback, 2013 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2013 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:

- Cloud Security, Trust Services, eId & Access Management

- Human Factors, Awareness & Privacy, Regulations and Policies

- Security Management

- Cyber Security, Cybercrime, Critical Infrastructures

- Mobile Security & Applications

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2013.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wonderfully Made
Tshwanelo Serumola Paperback  (1)
R160 R125 Discovery Miles 1 250
Says Who?
Sarah Randall Hardcover R573 Discovery Miles 5 730
Because Of Winn-Dixie
Kate Dicamillo Paperback R228 R193 Discovery Miles 1 930
Amanda and the Lost Time (Afrikaans…
Shelley Admont, Kidkiddos Books Hardcover R660 Discovery Miles 6 600
Chickens In Trouble
Emma Dredge Hardcover R570 R473 Discovery Miles 4 730
Isikhumba Esikuso - Umgubho Wokuguquka…
Sindiwe Magona, Nina G. Jablonski Paperback R168 Discovery Miles 1 680
Corey Shares A Secret! A Mental Health…
Ronnette Smith-Powell, Destiny Powell Hardcover R629 R530 Discovery Miles 5 300
The Way I Used to Be
Amber Smith Paperback R250 R200 Discovery Miles 2 000
Basketball GOATS
Bruce Berglund Paperback R215 R178 Discovery Miles 1 780
The Wheels The Friendship Race…
Inna Nusinsky, Kidkiddos Books Hardcover R675 Discovery Miles 6 750

 

Partners