ISSE 2008 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2008 Conference /

This book presents the most interesting talks given at ISSE 2008  the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart To...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Pohlmann, Norbert. (Editor), Reimer, Helmut. (Editor), Schneider, Wolfgang. (Editor)
Format: Electronic
Language:English
Published: Wiesbaden : Vieweg+Teubner, 2009.
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-8348-9283-6
LEADER 02293nam a22004335i 4500
001 7901
003 DE-He213
005 20130725191320.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 # # |a 9783834892836  |9 978-3-8348-9283-6 
024 7 # |a 10.1007/978-3-8348-9283-6  |2 doi 
050 # 4 |a QA76.9.A25 
072 # 7 |a UR  |2 bicssc 
072 # 7 |a UTN  |2 bicssc 
072 # 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 # |a Pohlmann, Norbert.  |e editor. 
245 1 0 |a ISSE 2008 Securing Electronic Business Processes  |b Highlights of the Information Security Solutions Europe 2008 Conference /  |c edited by Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider.  |h [electronic resource] : 
264 # 1 |a Wiesbaden :  |b Vieweg+Teubner,  |c 2009. 
300 # # |a XVI, 433p. 105 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
520 # # |a This book presents the most interesting talks given at ISSE 2008 the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, e-ID-Cards, Infrastructur Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2008. 
650 # 0 |a Computer science. 
650 # 0 |a Data protection. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
700 1 # |a Reimer, Helmut.  |e editor. 
700 1 # |a Schneider, Wolfgang.  |e editor. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783834806604 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-8348-9283-6 
912 # # |a ZDB-2-SCS 
950 # # |a Computer Science (Springer-11645)