img Leseprobe Leseprobe

ISSE/SECURE 2007 Securing Electronic Business Processes

Highlights of the Information Security Solutions Europe/SECURE 2007 Conference

PDF
ca. 53,49
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Vieweg & Teubner img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Informatik

Beschreibung

ENISA is proud to be working with eema, TeleTrusT, NASK (the Polish research and development organization and leading Polish data networks operator) and the German Federal Ministry of the Inte rior as well as the German Federal Offce for Information Security for this year’s 9th annual Information Security Solutions Europe Confer ence. The aimof the ISSE has always been to support the developmentof a European information security culture and especially a cross border framework for trustworthy IT applications for citizens, industry and administration. ENISA is committed to these goals. In our work we assist and advise the European Commission, Member States as well as business community on network and information security as well as on legislative requirements, and we are delighted to support the ISSE again this year. The security of communication networks and information systems is of increasing concern. In order to face today’s complex information security challenges it is clear that working collaboratively with one another is the key to generating new strategies to address these problems. It has been an exciting opportunity to facilitate this collaboration at the ISSE 2007, pulling together the wealth of industry knowledge, information and research that we hold in Europe, as well as across the globe. The success of this event in generating ideas and frank, lively debate around the complex topic of IT security is due also to the independent, varied nature of the programme, which was selected by world wide specialists in the feld.

Weitere Titel in dieser Kategorie
Cover Cyber Operations
Jerry M. Couretas
Cover Cyber Operations
Jerry M. Couretas

Kundenbewertungen

Schlagwörter

PKI, Biometrics, business process, Critical Infrastructure, IT security, Data Protection, information privacy, Smart Cards, Information Security, SPAM, Privacy, security, identity management, Service-oriented Computing, Cryptography