000 03427nam a22004215i 4500
001 978-3-658-00333-3
003 DE-He213
005 20140220083331.0
007 cr nn 008mamaa
008 121211s2012 gw | s |||| 0|eng d
020 _a9783658003333
_9978-3-658-00333-3
024 7 _a10.1007/978-3-658-00333-3
_2doi
050 4 _aQA75.5-76.95
072 7 _aUY
_2bicssc
072 7 _aCOM014000
_2bisacsh
082 0 4 _a004
_223
100 1 _aReimer, Helmut.
_eeditor.
245 1 0 _aISSE 2012 Securing Electronic Business Processes
_h[electronic resource] :
_bHighlights of the Information Security Solutions Europe 2012 Conference /
_cedited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer Vieweg,
_c2012.
300 _aXI, 334 p. 50 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aInformation Security Strategy -- Enterprise and Cloud Computing Security -- Security and Privacy -- Impact of Green Energy -- Human Factors of IT Security -- Solutions for Mobile Applications -- Identity & Access Management -- Trustworthy Infrastructures -- Separation & Isolation -- EU Digital Agenda -- Cyber Security: Hackers & Threats.
520 _aThis book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: Information Security Strategy; Enterprise and Cloud Computing Security Security and Privacy; Impact of Green Energy; Human Factors of IT Security Solutions for Mobile Applications; Identity & Access Management Trustworthy Infrastructures; Separation & Isolation EU Digital Agenda; Cyber Security: Hackers & Threats Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2012. Content Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security: Hackers & Threats Target Groups Developers of Electronic Business Processes IT Managers IT Security Experts Researchers The Editors Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westfälische University for Applied Sciences Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT
650 0 _aComputer science.
650 1 4 _aComputer Science.
650 2 4 _aComputer Science, general.
700 1 _aPohlmann, Norbert.
_eeditor.
700 1 _aSchneider, Wolfgang.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783658003326
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-658-00333-3
912 _aZDB-2-SCS
999 _c103895
_d103895