Norbert Pohlmann & Helmut Reimer 
ISSE 2009 Securing Electronic Business Processes 
Highlights of the Information Security Solutions Europe 2009 Conference

Apoio
€96.29
Métodos de Pagamento

Tabela de Conteúdo

Microsoft Sponsoring Contribution.- Claims and Identity: On-Premise and Cloud Solutions.- Economics of Security and Identity Management.- Measuring Information Security: Guidelines to Build Metrics.- Demystifying SAP security.- The ISACA Business Model for Information Security: An Integrative and Innovative Approach.- ICT Systems Contributing to European Secure-by-Design Critical Infrastructures.- ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment.- A General Quality Classification System for e IDs and e-Signatures.- Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals.- Security Services and Large Scale Public Applications.- User and Access Management in Belgian e-Government.- PKI – Crawling Out of the Grave & Into the Arms of Government.- Entitlement Management: Ready to Enter the Id M Mainstream.- Secure E-Mail Communication across Company Boundaries Experiences and Architectures.- Voice Biometrics as a Way to Self-service Password Reset.- Security Requirements Specification in Process-aware Information Systems.- Privacy, Data Protection and Awareness.- Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home.- Social Engineering hits Social Commerce.- How to Establish Security Awareness in Schools.- Privacy and Security – a Way to Manage the Dilemma.- Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment.- User Privacy in RFID Networks.- Web Sessions Anomaly Detection in Dynamic Environments.- Standards and technical Solutions.- Krypto NAS: Open source based NAS encryption.- Secure Network Zones.- ETSI Specifications for Registered E-Mail REM.- Acceptance of Trust Domains in IT-Infrastructures.- Proposal for an ITSecurity Standard for Preventing Tax Fraud in Cash Registers.- The Operational Manager – Enemy or Hero of Secure Business Practice?.- Secure Software, Trust and Assurance.- A Structured Approach to Software Security.- Using Compilers to Enhance Cryptographic Product Development.- Why Secure Coding is not Enough: Professionals’ Perspective.- Proactive Security Testing and Fuzzing.- Protecting Long Term Validity of PDF documents with PAd ES-LTV.- RE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms.- Future of Assurance: Ensuring that a System is Trustworthy.- A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents.

Sobre o autor

Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen
Helmut Reimer: Senior Consultant, Tele Trus T
Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT
Compre este e-book e ganhe mais 1 GRÁTIS!
Língua Inglês ● Formato PDF ● Páginas 368 ● ISBN 9783834893635 ● Tamanho do arquivo 180.8 MB ● Editor Norbert Pohlmann & Helmut Reimer ● Editora Vieweg & Teubner ● Cidade Wiesbaden ● País DE ● Publicado 2010 ● Carregável 24 meses ● Moeda EUR ● ID 5251529 ● Proteção contra cópia DRM social

Mais ebooks do mesmo autor(es) / Editor

828 Ebooks nesta categoria