ISSE 2008 Securing Electronic Business Processes (eBook, PDF)
Highlights of the Information Security Solutions Europe 2008 Conference
53,49 €
inkl. MwSt.
Sofort per Download lieferbar
ISSE 2008 Securing Electronic Business Processes (eBook, PDF)
Highlights of the Information Security Solutions Europe 2008 Conference
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 23.72MB
- Upload möglich
Andere Kunden interessierten sich auch für
- ISSE/SECURE 2007 Securing Electronic Business Processes (eBook, PDF)53,49 €
- ISSE 2006 Securing Electronic Business Processes (eBook, PDF)53,49 €
- ISSE 2013 Securing Electronic Business Processes (eBook, PDF)53,49 €
- ISSE 2014 Securing Electronic Business Processes (eBook, PDF)53,49 €
- Elisa BertinoSecurity for Web Services and Service-Oriented Architectures (eBook, PDF)39,95 €
- Technologies for Business Information Systems (eBook, PDF)149,79 €
- Susan LinckeInformation Security Planning (eBook, PDF)53,49 €
-
-
-
Produktdetails
- Verlag: Vieweg & Teubner
- Erscheinungstermin: 7. März 2009
- Englisch
- ISBN-13: 9783834892836
- Artikelnr.: 37400538
Security Management and Economics of Security.- The Information Security Framework for Daimler Financial Services and its Implementation.- Information Security Status in Organisations 2008.- Quantified Trust Levels for Authentication.- Identity Management in Open Environments.- Identity management and privacy languages technologies: Improving user control of data privacy.- Security Economics and European Policy.- How Economy and Society affect Enterprise Security Management.- Information Security Industry: State of the Art.- Privacy, Data Protection and Awareness.- Freedom and Security - Responses to the Threat of International Terrorism.- The Anonymity vs. Utility Dilemma.- Governmental Control of the Internet in addressing Law Enforcement and National Security.- Theft of Virtual Property - Towards Security Requirements for Virtual Worlds.- Trusted Computing and Biometrics.- Trusted Storage: Putting Security and Data Together.- Trust in Consumer Electronics.- NAC 2.0 - Unifying Network Security.- Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect.- Empirical research of IP blacklists.- GIDRE: Grid-based Detection Intrusion and Response Environment.- Biometrics and ID Cards - Enablers for Personal Security.- Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases.- Web 2.0 Security and Large Scale Public Applications.- Development and Implementation of an Encryption Strategy for a global Enterprise.- Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool.- Symmetric Key Services Markup Language (SKSML).- Managing business compliance using model-driven security management.- Secure E-Business applications based on the EuropeanCitizen Card.- Electronic Signatures for Public Procurement across Europe.- Progress through uniformity.- PPs for applications with the Spanish National Electronic Identity Card.- Fraud Detection, Prevention and Critical Infrastructures.- OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trends.- NSA Suite B and its significance for non-USA organisations.- Managing vulnerabilities and achieving compliance for Oracle databases in a modern ERP environment.- Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain.- The need for the Protection of Critical National Infrastructures.- Challenges for the Protection of Critical ICT-Based Financial Infrastructures.- Security for VoIP, Mobility and Web.- Evaluating Measures and Countermeasures for SPAM over Internet Telephony.- Influence of Security Mechanisms on the Quality of Service of VoIP.- The security of mass transport ticketing systems.- Authentication for Web Services with the Internet Smart Card.- Hardened Client Platforms for Secure Internet Banking.- Securing Flash Technology: How Does It Look From Inside?.- German Workshop: European Citizen Cards.- Deployment of German Electronic Citizen Cards in Banking: Opportunities and Challenges.- Security Requirements for One Stop Government.- Infrastructures and Middleware for the Application of eID Cards in eGovernment.- Securing Contactless Chips with PACE.
Security Management and Economics of Security.- The Information Security Framework for Daimler Financial Services and its Implementation.- Information Security Status in Organisations 2008.- Quantified Trust Levels for Authentication.- Identity Management in Open Environments.- Identity management and privacy languages technologies: Improving user control of data privacy.- Security Economics and European Policy.- How Economy and Society affect Enterprise Security Management.- Information Security Industry: State of the Art.- Privacy, Data Protection and Awareness.- Freedom and Security - Responses to the Threat of International Terrorism.- The Anonymity vs. Utility Dilemma.- Governmental Control of the Internet in addressing Law Enforcement and National Security.- Theft of Virtual Property - Towards Security Requirements for Virtual Worlds.- Trusted Computing and Biometrics.- Trusted Storage: Putting Security and Data Together.- Trust in Consumer Electronics.- NAC 2.0 - Unifying Network Security.- Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect.- Empirical research of IP blacklists.- GIDRE: Grid-based Detection Intrusion and Response Environment.- Biometrics and ID Cards - Enablers for Personal Security.- Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases.- Web 2.0 Security and Large Scale Public Applications.- Development and Implementation of an Encryption Strategy for a global Enterprise.- Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool.- Symmetric Key Services Markup Language (SKSML).- Managing business compliance using model-driven security management.- Secure E-Business applications based on the EuropeanCitizen Card.- Electronic Signatures for Public Procurement across Europe.- Progress through uniformity.- PPs for applications with the Spanish National Electronic Identity Card.- Fraud Detection, Prevention and Critical Infrastructures.- OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trends.- NSA Suite B and its significance for non-USA organisations.- Managing vulnerabilities and achieving compliance for Oracle databases in a modern ERP environment.- Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain.- The need for the Protection of Critical National Infrastructures.- Challenges for the Protection of Critical ICT-Based Financial Infrastructures.- Security for VoIP, Mobility and Web.- Evaluating Measures and Countermeasures for SPAM over Internet Telephony.- Influence of Security Mechanisms on the Quality of Service of VoIP.- The security of mass transport ticketing systems.- Authentication for Web Services with the Internet Smart Card.- Hardened Client Platforms for Secure Internet Banking.- Securing Flash Technology: How Does It Look From Inside?.- German Workshop: European Citizen Cards.- Deployment of German Electronic Citizen Cards in Banking: Opportunities and Challenges.- Security Requirements for One Stop Government.- Infrastructures and Middleware for the Application of eID Cards in eGovernment.- Securing Contactless Chips with PACE.