Details

ISSE 2008 Securing Electronic Business Processes


ISSE 2008 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2008 Conference

von: Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider

53,49 €

Verlag: Vieweg & Teubner
Format: PDF
Veröffentl.: 07.03.2009
ISBN/EAN: 9783834892836
Sprache: englisch
Anzahl Seiten: 433

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. <br>
The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects.<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
Legal, Technical and Social Aspects of Security - Identity and Security Management - PKI based and Web 2.0 Security Services - Fraud Detection, Evaluation and Prevention - Large Scale Public Applications
Best Papers of the Conference ISSE 2008
Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen<br>
Helmut Reimer: Senior Partner, TeleTrusT <br>
Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT<br>
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. <br>
The topics include: <br>
- Identity Management, Information Security Management<br>
- PKI-Solutions, Economics of IT-Security<br>
- Smart Tokens, e-ID-Cards, Infrastructur Solutions<br>
- Critical Information Infrastructure Protection, Data Protection, Legal Aspects<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.
<p>State-of-the-Art; best papers of the Conference ISSE 2008</p>
This book presents the most interesting talks given at ISSE 2008 – the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. <br>
The topics include: <br>
- Identity Management, Information Security Management<br>
- PKI-Solutions, Economics of IT-Security<br>
- Smart Tokens, e-ID-Cards, Infrastructur Solutions<br>
- Critical Information Infrastructure Protection, Data Protection, Legal Aspects<br>
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008.

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
96,29 €
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
96,29 €