Norbert Pohlmann & Helmut Reimer 
ISSE 2009 Securing Electronic Business Processes [PDF ebook] 
Highlights of the Information Security Solutions Europe 2009 Conference

Supporto
€96.29
Modalità di pagamento

Tabella dei contenuti

Microsoft Sponsoring Contribution.- Claims and Identity: On-Premise and Cloud Solutions.- Economics of Security and Identity Management.- Measuring Information Security: Guidelines to Build Metrics.- Demystifying SAP security.- The ISACA Business Model for Information Security: An Integrative and Innovative Approach.- ICT Systems Contributing to European Secure-by-Design Critical Infrastructures.- ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment.- A General Quality Classification System for e IDs and e-Signatures.- Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals.- Security Services and Large Scale Public Applications.- User and Access Management in Belgian e-Government.- PKI – Crawling Out of the Grave & Into the Arms of Government.- Entitlement Management: Ready to Enter the Id M Mainstream.- Secure E-Mail Communication across Company Boundaries Experiences and Architectures.- Voice Biometrics as a Way to Self-service Password Reset.- Security Requirements Specification in Process-aware Information Systems.- Privacy, Data Protection and Awareness.- Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home.- Social Engineering hits Social Commerce.- How to Establish Security Awareness in Schools.- Privacy and Security – a Way to Manage the Dilemma.- Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment.- User Privacy in RFID Networks.- Web Sessions Anomaly Detection in Dynamic Environments.- Standards and technical Solutions.- Krypto NAS: Open source based NAS encryption.- Secure Network Zones.- ETSI Specifications for Registered E-Mail REM.- Acceptance of Trust Domains in IT-Infrastructures.- Proposal for an ITSecurity Standard for Preventing Tax Fraud in Cash Registers.- The Operational Manager – Enemy or Hero of Secure Business Practice?.- Secure Software, Trust and Assurance.- A Structured Approach to Software Security.- Using Compilers to Enhance Cryptographic Product Development.- Why Secure Coding is not Enough: Professionals’ Perspective.- Proactive Security Testing and Fuzzing.- Protecting Long Term Validity of PDF documents with PAd ES-LTV.- RE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms.- Future of Assurance: Ensuring that a System is Trustworthy.- A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents.

Circa l’autore

Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen
Helmut Reimer: Senior Consultant, Tele Trus T
Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT

Acquista questo ebook e ricevine 1 in più GRATIS!
Lingua Inglese ● Formato PDF ● Pagine 368 ● ISBN 9783834893635 ● Dimensione 180.8 MB ● Editore Norbert Pohlmann & Helmut Reimer ● Casa editrice Vieweg & Teubner ● Città Wiesbaden ● Paese DE ● Pubblicato 2010 ● Scaricabile 24 mesi ● Moneta EUR ● ID 5251529 ● Protezione dalla copia DRM sociale

Altri ebook dello stesso autore / Editore

849 Ebook in questa categoria