Logo - springer
Slogan - springer

Springer Vieweg - IT & Informatik - Grundlagen | ISSE 2012 Securing Electronic Business Processes - Highlights of the Information Security Solutions

ISSE 2012 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe 2012 Conference

Reimer, Helmut, Pohlmann, Norbert, Schneider, Wolfgang (Eds.)

2013, XI, 334 p. 50 illus.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$49.95

(net) price for USA

ISBN 978-3-658-00333-3

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$69.95

(net) price for USA

ISBN 978-3-658-00332-6

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • The most interesting talks given at ISSE 2012

This book presents the most interesting talks given at ISSE 2012 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:

Information Security Strategy; Enterprise and Cloud Computing Security

Security and Privacy; Impact of Green Energy; Human Factors of IT Security

Solutions for Mobile Applications; Identity & Access Management

Trustworthy Infrastructures; Separation & Isolation

EU Digital Agenda; Cyber Security: Hackers & Threats

Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications.

The reader may expect state-of-the-art: best papers of the Conference ISSE 2012.

Content

Information Security Strategy - Enterprise and Cloud Computing Security - Security and Privacy - Impact of Green Energy - Human Factors of IT Security - Solutions for Mobile Applications - Identity & Access Management - Trustworthy Infrastructures - Separation & Isolation - EU Digital Agenda - Cyber Security: Hackers & Threats

Target Groups

Developers of Electronic Business Processes

IT Managers

IT Security Experts

Researchers

The Editors

Norbert Pohlmann: Professor for Information Security and Director of the Institute for Internet Security at the Westfälische University for Applied Sciences Gelsenkirchen

Helmut Reimer: Senior Consultant, TeleTrusT

Wolfgang Schneider: Senior Adviser, Fraunhofer Institute SIT

Content Level » Professional/practitioner

Keywords » Data Security - Electronic Business Processes - ISSE

Related subjects » Grundlagen

Table of contents / Sample pages 

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Science (general).