Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (17)
  • Computersicherheit  (17)
  • Computer Science  (17)
Datasource
Material
Language
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Oxford : Oxford University Press
    ISBN: 9780191840166
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Oxford handbooks online
    Series Statement: Political Science
    Parallel Title: Erscheint auch als The Oxford handbook of cyber security
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer networks Security measures ; Computersicherheit ; Cyberattacke ; Computerkriminalität ; Sicherheitspolitik
    Abstract: 'The Oxford Handbook of Cyber Security' presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783748927679
    Language: German
    Pages: 1 Online-Ressource (156 Seiten)
    Edition: 1. Auflage
    Series Statement: Schriften zum IT-Sicherheitsrecht Band 2
    Parallel Title: Erscheint auch als Cybersecurity als Unternehmensleitungsaufgabe
    DDC: 346.43065
    RVK:
    RVK:
    Keywords: Aufsatzsammlung ; Deutschland ; Unternehmensleitung ; Computersicherheit ; Risikomanagement ; Compliance-System ; Haftung ; China ; Unternehmensleitung ; Computersicherheit ; Compliance-System ; Datenschutz ; Deutschland ; Unternehmensleitung ; Computersicherheit ; Risikomanagement ; Compliance-System ; Haftung ; China ; Unternehmensleitung ; Computersicherheit ; Compliance-System ; Datenschutz
    Note: Enthält 7 Beiträge
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Wiesbaden : Springer VS
    ISBN: 9783658261504
    Language: German
    Pages: 1 Online-Ressource (XII, 162 Seiten) , Illustrationen
    Parallel Title: Erscheint auch als
    DDC: 306.42
    RVK:
    RVK:
    Keywords: Knowledge - Discourse ; Cybercrime ; Computer crimes ; Computersicherheit ; Internetkriminalität ; Einführung ; Lehrbuch ; Einführung ; Lehrbuch ; Einführung ; Lehrbuch ; Internetkriminalität ; Computersicherheit
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    ISBN: 9783958452756
    Language: English , German
    Pages: 1 online resource (520 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Harich, Thomas W. IT-Sicherheitsmanagement
    DDC: 005.80218
    RVK:
    RVK:
    Keywords: Electronic books ; local ; BSI ; ISMS ; ISO-27001 ; IT-System ; Compliance ; Monitoring ; Sicherheit ; Controlling ; Datenschutz ; Richtlinien ; DIN-NIA-01-27 ; IT-Compliance ; IT-Sicherheit ; Risikofaktoren ; Cloud Computing ; Datensicherheit ; Risikobewertung ; Datenschutzrecht ; Penetrationstest ; Softwareprojekte ; Geschäftsprozesse ; Notfallmanagement ; digitale Signatur ; Balanced Scorecard ; IT-Risikomanagement ; Softwareentwicklung ; Identitätsmanagement ; Informationssicherheit ; Business Impact-Analyse ; IT-Sicherheitsverfahren ; Risikomanagementprozess ; IT-Sicherheitsmanagement ; ISO/IEC 27001 ; Europäische Union Datenschutz-Grundverordnung ; Computersicherheit ; Rechnernetz ; Systemverwaltung ; Datensicherung ; Computersicherheit
    Abstract: Praxiswissen für IT Security Manager Mit einem durchdachten IT-Sicherheitskonzept zu mehr Informationssicherheit IT Compliance, Business Continuity Management, Risikomanagement oder Security Audit – alle Bereiche des IT Security Managers praxisnah erklärt Aufbau eines Information Security Management Systems (ISMS) nach ISO 27001 und BSI – unter Berücksichtigung der neuen DSGVO Immer mehr Daten werden in Public Clouds verarbeitet, auf Mobiltelefonen gespeichert, über Chat-Apps geteilt oder im Rahmen von Industrie 4.0 in einer Größenordnung erhoben, die bislang kaum denkbar war. Die entsprechenden Maßnahmen der IT-Security müssen sich an diese Veränderungen anpassen. Ebenso wie an die EU-Datenschutz-Grundverordnung, das IT-Sicherheitsgesetz oder das China Cybersecurity Law. Alle diese Regelungen haben immense Auswirkungen darauf, wie Unternehmen Daten erfassen, verarbeiten, speichern oder austauschen dürfen. In der Fülle und der Bandbreite der neuen Regelungen liegt aber immer auch die Gefahr, etwas falsch zu machen. Dieser Praxisleitfaden wird Ihnen dabei helfen, von der schieren Menge an Einzelthemen und Aufgaben, mit denen sich der (angehende) IT Security Manager auseinanderzusetzen hat, nicht erschlagen zu werden und den richtigen Weg zu wählen, um mit all diesen Anforderungen umzugehen. Jedes Kapitel dieses Buches beschreibt einen zusammenhängenden Bereich der IT Security. Die notwendige theoretische Fundierung wechselt sich dabei ab mit Tipps aus der Praxis für die Praxis, mit für den Berufsalltag typischen Fragestellungen, vielen konkreten Beispielen und hilfreichen Checklisten. Alle Teilgebiete werden abschließend in einem Kapitel zusammengeführt, das die Einführung und Weiterentwicklung eines IT-Sicherheitsmanagements auf Basis der ISO-27000-Normen-Familie unter Beachtung der datenschutzrechtlichen Bestimmungen der EU-DSGVO behandelt. So erhalten Sie sowohl einen kompetenten Praxisleitfaden (auch für den Berufseinstieg) als auch ein umfassendes Nachschlagewerk für Ihre tägliche Arbeit. Aus dem Inhalt: Umfang und Aufgabe des IT-Security-Managements Organisation der IT-Security IT-Compliance Organisation von Richtlinien Betrieb der IT-Security IT Business Continuity Management IT-Notfallmanagement Verfügbarkeitsmanagement Technische IT-Security IT-Risikomanagement Sicherheitsmonitoring IT-Security-Audit Management von Sicherheitsereignissen und IT-Forensik Kennzahlen Praxis: Aufbau eines ISMS Awareness und Schulung Über den Autor: T...
    Note: Online resource; Title from title page (viewed June 26, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: German
    Pages: 1 Online-Ressource (245 Seiten) , Illustrationen, Diagramme
    Parallel Title: Erscheint auch als CASE | KRITIS
    DDC: 363.10028558
    RVK:
    Keywords: Datensicherheit ; Krisenmanagement ; Infrastruktur ; Unternehmen ; Öffentliche Verwaltung ; Deutschland ; Datensicherheit ; Krisenmanagement ; Infrastruktur ; Unternehmen ; Öffentliche Verwaltung ; Deutschland ; Datensicherheit ; Deutschland ; Infrastruktur ; Krisenmanagement ; Unternehmen ; Öffentliche Verwaltung ; Fallstudie ; Fallstudiensammlung ; Deutschland ; Kritische Infrastruktur ; Computersicherheit ; Informationsmanagement ; Erfolgsfaktor ; Deutschland ; Kritische Infrastruktur ; Computersicherheit ; Krisenmanagement
    Note: Förderkennzeichen BMBF16 KIS 0213 K-16 KIS 0216 K. - Verbund-Nummer 01157786 , Enthält 17 Beiträge , Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cambridge, MA : Syngress, an imprint of Elsevier
    ISBN: 9780128045053 , 0128045051 , 0128044586 , 9780128044582
    Language: English
    Pages: 1 online resource (144 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004.67/8
    RVK:
    RVK:
    Keywords: COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; Computer networks / Security measures ; Computer security ; Internet of things ; Internet of things ; Computer networks Security measures ; Computer security ; Internet der Dinge ; Computersicherheit ; Internet der Dinge ; Computersicherheit
    Abstract: "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780128038383 , 0128038381
    Language: English
    Pages: 1 online resource (273 pages) , illustrations
    Series Statement: Syngress advanced topics in information security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: COMPUTERS / Security / General ; Computer networks / Security measures ; Computer security ; Cyber intelligence (Computer security) ; Computer security ; Computer networks Security measures ; Cyber intelligence (Computer security) ; Informationssystem ; Unternehmen ; Datensicherung ; Computersicherheit ; Rechnernetz ; Rechnernetz ; Computersicherheit ; Datensicherung ; Unternehmen ; Datensicherung ; Informationssystem
    Abstract: "Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic.
    Abstract: The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.
    Abstract: Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of 'goal structured notation' together with a 'judgment calculus' and their automation as a 'rule set' to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128004784 , 0128004789 , 0128000066 , 9780128000069
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Security / Networking ; Big data ; Computer security ; Computer security ; Big data ; Computersicherheit ; Bedrohung ; Big Data ; Prognose ; Computersicherheit ; Big Data ; Bedrohung ; Prognose
    Abstract: This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
    Note: Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780124201842 , 0124201849
    Language: English
    Pages: 1 online resource (xix, 439 pages) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 670.42/7
    RVK:
    Keywords: TECHNOLOGY & ENGINEERING / Industrial Engineering ; TECHNOLOGY & ENGINEERING / Industrial Technology ; TECHNOLOGY & ENGINEERING / Manufacturing ; TECHNOLOGY & ENGINEERING / Technical & Manufacturing Industries & Trades ; Computer security ; Corporate Network ; Computersicherheit ; Intelligentes Stromnetz ; SCADA / Programm ; Process control Security measures ; Computer security ; Intelligentes Stromnetz ; Computersicherheit ; SCADA ; Corporate Network ; Computersicherheit ; Corporate Network ; Intelligentes Stromnetz ; SCADA
    Abstract: Annotation
    Note: Previous edition: 2011 , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780128010969 , 0128010967 , 0128008997 , 9780128008997
    Language: English
    Pages: 1 online resource (xvii, 262 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 363.28/9
    RVK:
    Keywords: HISTORY / Military / Other ; TECHNOLOGY & ENGINEERING / Military Science ; Computer security ; Private security services / Management ; Security systems / Management ; Computer Security ; Computer security ; Private security services Management ; Security systems Management ; Computersicherheit ; Unternehmen ; Unternehmen ; Computersicherheit
    Abstract: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Organizations need to be committed to defending their own assets and their customers' information. This book will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. It explains how to develop and build a security operations center; shows how to gather invaluable intelligence to protect your organization; helps you evaluate the pros and cons behind each decision during the SOC-building process. --
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9789400729032
    Language: English
    Pages: Online-Ressource (XVIII, 363p. 20 illus., 10 illus. in color, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. European Data Protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Data protection--Law and legislation--European Union countries. ; Privacy, Right of--European Union countries. ; Europäische Union ; Computersicherheit ; Datenschutz
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780080960944 , 0080960944 , 1282309250 , 9781282309258
    Language: English
    Pages: 1 online resource (xix, 504 pages)
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8068
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks / Security measures ; Computer networks / Testing ; Computer hackers ; Hackers ; Computer networks / Security measures ; Computer networks / Testing ; Computer networks / Security measures ; Computer networks / Testing ; Computer hackers ; Computer security Examinations ; Practice ; Rechnernetz ; Computersicherheit ; Penetrationstest ; Rechnernetz ; Computersicherheit ; Penetrationstest
    Abstract: Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Amsterdam : Elsevier/Morgan Kaufmann
    ISBN: 9780080555881 , 0080555888
    Language: English
    Pages: 1 online resource (xxxvii, 537 pages) , illustrations
    Series Statement: Morgan Kaufmann series in networking
    Series Statement: Morgan Kaufmann series in computer security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks / Security measures ; Computer networks / Reliability ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer security ; Security measures ; Reliability ; Computer networks / Security measures ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer networks / Reliability ; Computer networks ; Computer networks Security measures ; Computer networks Reliability ; Computer security ; Computersicherheit ; Rechnernetz ; Zuverlässigkeit ; Rechnernetz ; Zuverlässigkeit ; Computersicherheit
    Abstract: In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks
    Abstract: Printbegrænsninger: Der kan printes kapitelvis
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9789264025516
    Language: English
    Pages: Online-Ressource (132 p.)
    Series Statement: OECD Reviews of Risk Management Policies
    Parallel Title: Erscheint auch als Norway
    RVK:
    RVK:
    Keywords: Datensicherheit ; Norwegen ; Science and Technology ; Norway ; Norwegen ; Computersicherheit ; Internet ; Datenschutz ; Innere Sicherheit
    Abstract: The development of information and communication technologies and networks, and in particular that of the Internet, has gone hand in hand with the emergence of new types of malevolent actions called cyber-crime: viruses, worms, Trojan horses, and the like. While a number of factors make a strong case for governmental action in the area of information security, there are also important limits to what governments can achieve. This review, the first in a series of risk management policy reviews being conducted by the OECD, identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made. For areas that could benefit from improvement, it proposes opportunities for action and, when possible, suggests alternatives.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    New York, NY : Springer New York
    ISBN: 9780387271606
    Language: English
    Pages: Online-Ressource (X, 291 p, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. Curtin, Matt Brute force
    RVK:
    Keywords: Science (General) ; Data encryption (Computer science) ; Coding theory ; Computer science ; Mathematics ; Popular Science ; Science (General) ; Data encryption (Computer science) ; Coding theory ; Computer science ; Mathematics ; Kryptologie ; Kryptologie ; Computersicherheit
    Abstract: In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin charts the rise and fall of DES and chronicles the efforts of those who were determined to master it.
    Abstract: "In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption standard). The strength of an encryption system is best measured by the attacks it is able to withstand, and because DES was the federal standard, many tried to test its limits. (It should also be noted that a number of cryptographers and computer scientists told the NSA that DES was not nearly strong enough and would be easily hacked.) Rogue hackers, usually out to steal as much information as possible, tried to break DES. A number of ""white hat"" hackers also tested the system and reported on their successes. Still others attacked DES because they believed it had outlived its effectiveness and was becoming increasingly vulnerable. The sum total of these efforts to use all of the possible keys to break DES over time made for a brute force attack.In 1996, the supposedly uncrackable DES was broken. In this captivating and intriguing book, Matt Curtin charts DES's rise and fall and chronicles the efforts of those who were determined to master it."
    Description / Table of Contents: Working lateKeeping secrets -- Data encryption standard -- Key length -- Discovery -- RSA crypto challenges -- Congress takes note -- Supercomputer -- Organizing DESCHALL -- Needle in a haystack -- Spreading the word -- The race is on -- Clients -- Architecture -- Progress -- Trouble -- Milestones -- Gateways -- Network -- Download -- Short circuit -- DESCHALL community -- Proposal -- In the lead -- Recruiting -- Threats -- Overdrive -- Distributed -- An obstacle -- Export -- Getting word out -- Salvos in the crypto wars -- New competition -- Netlag -- Terminal velocity -- Duct tape -- Showdown in the senate -- Strong cryptography makes the world a safer place -- Aftermath -- Staying the course -- In retrospect.
    Note: Includes bibliographical references (p. 283-285) and index
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...