Details
ISSE 2008 Securing Electronic Business Processes
Highlights of the Information Security Solutions Europe 2008 Conference
53,49 € |
|
Verlag: | Vieweg & Teubner |
Format: | |
Veröffentl.: | 07.03.2009 |
ISBN/EAN: | 9783834892836 |
Sprache: | englisch |
Anzahl Seiten: | 433 |
Dieses eBook enthält ein Wasserzeichen.
Beschreibungen
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. <br>
The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects.<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects.<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
Legal, Technical and Social Aspects of Security - Identity and Security Management - PKI based and Web 2.0 Security Services - Fraud Detection, Evaluation and Prevention - Large Scale Public Applications
Best Papers of the Conference ISSE 2008
Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen<br>
Helmut Reimer: Senior Partner, TeleTrusT <br>
Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT<br>
Helmut Reimer: Senior Partner, TeleTrusT <br>
Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT<br>
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. <br>
The topics include: <br>
- Identity Management, Information Security Management<br>
- PKI-Solutions, Economics of IT-Security<br>
- Smart Tokens, e-ID-Cards, Infrastructur Solutions<br>
- Critical Information Infrastructure Protection, Data Protection, Legal Aspects<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
The topics include: <br>
- Identity Management, Information Security Management<br>
- PKI-Solutions, Economics of IT-Security<br>
- Smart Tokens, e-ID-Cards, Infrastructur Solutions<br>
- Critical Information Infrastructure Protection, Data Protection, Legal Aspects<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
<p>State-of-the-Art; best papers of the Conference ISSE 2008</p>
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. <br>
The topics include: <br>
- Identity Management, Information Security Management<br>
- PKI-Solutions, Economics of IT-Security<br>
- Smart Tokens, e-ID-Cards, Infrastructur Solutions<br>
- Critical Information Infrastructure Protection, Data Protection, Legal Aspects<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
The topics include: <br>
- Identity Management, Information Security Management<br>
- PKI-Solutions, Economics of IT-Security<br>
- Smart Tokens, e-ID-Cards, Infrastructur Solutions<br>
- Critical Information Infrastructure Protection, Data Protection, Legal Aspects<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.