ISSE 2012 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2012 Conference

This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: Information Security Strategy; Enterprise and Cloud Computing Security Security and Privacy; Impact of Gre...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Reimer, Helmut (Editor)
Pohlmann, Norbert (Editor)
Schneider, Wolfgang (Editor)
Korporace: SpringerLink (online služba) (Distributor) 
Médium: E-kniha
Jazyk:angličtina
Vydáno: Wiesbaden : Springer Fachmedien Wiesbaden : 2012
Žánr/forma:elektronické knihy
ISBN:9783658003333
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
LEADER 03513nam a22003975i 4500
001 001810781
003 CZ PrSTK
005 20180829115854.0
006 m f d
007 cr nn 008mamaa
008 121211s2012 gw | s |||| 0|eng d
020 |a 9783658003333  |9 978-3-658-00333-3 
024 7 |a 10.1007/978-3-658-00333-3  |2 doi 
040 |a DE-He213  |b cze  |d ABA013  |e rda 
050 4 |a QA75.5-76.95 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004  |2 MRF 
245 1 0 |a ISSE 2012 Securing Electronic Business Processes :  |b Highlights of the Information Security Solutions Europe 2012 Conference /  |c edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider 
264 1 |a Wiesbaden :  |b Springer Fachmedien Wiesbaden :  |c 2012 
300 |a 1 online zdroj (XI, 334 p. 50 illus.) 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
520 |a This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: Information Security Strategy; Enterprise and Cloud Computing Security Security and Privacy; Impact of Green Energy; Human Factors of IT Security Solutions for Mobile Applications; Identity & Access Management Trustworthy Infrastructures; Separation & Isolation EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security: Hackers & Threats Target Groups Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westfälische University for Applied Sciences Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT 
505 0 |a Information Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy -- Impact of Green Energy -- Human Factors of IT Security -- Solutions for Mobile Applications -- Identity & Access Management -- Trustworthy Infrastructures -- Separation & Isolation -- EU Digital Agenda -- Cyber Security: Hackers & Threats 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
659 0 |a Computer science 
659 1 4 |a Computer Science, general  |0 http://scigraph.springernature.com/things/product-market-codes/I00001 
700 1 |a Reimer, Helmut  |4 edt 
700 1 |a Pohlmann, Norbert  |4 edt 
700 1 |a Schneider, Wolfgang  |4 edt 
710 2 |a SpringerLink (online služba)  |7 ntk2018999494  |4 dst 
776 0 8 |i Tištěné vydání :  |t ISSE 2012 Securing Electronic Business Processes 
856 4 0 |u https://doi.org/10.1007/978-3-658-00333-3  |y Plný text 
910 |a ABA013 
950 |a Springer  |b Computer Science 2015