Managing information systems security and privacy:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin
Springer
2006
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIII, 235 S. |
ISBN: | 3540281037 9783540281030 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021238607 | ||
003 | DE-604 | ||
005 | 20060621 | ||
007 | t | ||
008 | 051124s2006 gw |||| 00||| eng d | ||
015 | |a 05,N41,1064 |2 dnb | ||
016 | 7 | |a 976398354 |2 DE-101 | |
020 | |a 3540281037 |c Gb. : EUR 80.20 (freier Pr.), sfr 127.00 (freier Pr.) |9 3-540-28103-7 | ||
020 | |a 9783540281030 |9 978-3-540-28103-0 | ||
024 | 3 | |a 9783540281030 | |
028 | 5 | 2 | |a 11381846 |
035 | |a (OCoLC)62554192 | ||
035 | |a (DE-599)BVBBV021238607 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-355 |a DE-573 |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8068 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 650 |2 sdnb | ||
100 | 1 | |a Trček, Denis |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managing information systems security and privacy |c Denis Trcek |
250 | |a 1. ed. | ||
264 | 1 | |a Berlin |b Springer |c 2006 | |
300 | |a XIII, 235 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security |x Management | |
650 | 4 | |a Information technology |x Security measures | |
650 | 0 | 7 | |a Datenverwaltung |0 (DE-588)4011168-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 1 | |a Datenverwaltung |0 (DE-588)4011168-4 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 5 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014281327&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014281327 |
Datensatz im Suchindex
_version_ | 1804134684858253312 |
---|---|
adam_text | CONTENTS
INTRODUCTIO
N - TH
E SCOP
E O
F TH
E WOR
K AN
D IT
S METHODOLOG
Y 1
1.1 DEFINING SECURITY AND PRIVACY 2
1.2 TH
E IMPORTANC
E OF STANDARD
S 4
1.3 TECHNOLOGICAL ISSUES 7
1.4 ORGANIZATION AND TH
E HUMAN FACTOR 8
1.5 LEGAL FRAMEWORKS 9
1.6 BEFORE PROCEEDING FURTHER 10
ORGANIZATION
, SECURIT
Y AN
D PRIVAC
Y 1
3
2.1 RECENT HISTORY OF TH
E FIELD 13
2.2 FRAMEWORKS LEVEL 15
2.2.1 ASSETS 17
2.2.2 THREAT
S 17
2.2.3 VULNERABILITIES 18
2.2.4 RISKS AND IMPACTS 18
2.2.5 SAFEGUARDS AND RESIDUAL RISK 18
2.2.6 TH
E CONCEPT OF SECURITY MANAGEMENT PROCESSES 19
2.3 TECHNIQUES FOR ISS SECURITY MANAGEMENT 19
2.3.1 SECURITY OBJECTIVES AND STRATEGIES 20
2.3.2 SECURITY RELATED ORGANIZATIONAL ISSUES 21
2.3.3 RISK ANALYSIS 21
2.3.4 SAFEGUARDS SELECTION, SECURITY POLICY DEFINITION AND
ITS REALIZATION 26
2.3.5 SUPERVISION AND INCIDENT HANDLING 27
2.4 PARTICULA
R IMPLEMENTATIONS LEVEL 27
2.4.1 GENERAL HINTS FOR SELECTION OF SAFEGUARDS 28
2.4.2 ORGANIZATIONAL SAFEGUARDS 29
2.4.3 PERSONNEL SECURITY 29
2.4.4 PHYSICAL AND ENVIRONMENTAL SECURITY 30
2.4.5 ACCESS CONTROL, COMMUNICATIONS AND OPERATION
S
SECURITY 31
XII CONTENTS
2.4.6 ISS DEVELOPMENT, MAINTENANCE, AND MONITORING 33
2.4.7 INCIDENT HANDLING 36
2.4.8 BUSINESS CONTINUITY PLANNING 36
2.4.9 COMPLIANCE AND AUDITING 37
2.4.10 SECURITY AWARENESS 38
2.5 STANDARDIZE
D SAFEGUARD TEMPLATES 39
2.5.1 ORGANIZATIONAL SAFEGUARD TEMPLATES 39
2.5.2 TECHNOLOGY COMPLIANCE SAFEGUARDS 39
3 SECURIT
Y TECHNOLOGY
: CONCEPT
S AN
D MODEL
S 4
3
3.1 SECURITY MECHANISMS 44
3.1.1 PSEUDORANDOM NUMBER GENERATOR
S 44
3.1.2 ONE-WAY HASH FUNCTIONS 45
3.1.3 SYMMETRIC ALGORITHMS 47
3.1.4 ASYMMETRIC ALGORITHMS 51
3.1.5 STEGANOGRAPHY AND WATERMARKING 54
3.2 CRYPTOGRAPHI
C PROTOCOLS 56
3.2.1 A BRIEF OVERVIEW OF COMPUTER COMMUNICATIONS 57
3.2.2 SECURITY SERVICES 59
3.2.3 MODELS OF SECURITY SERVICES 59
3.2.4 TH
E RELATIONSHIPS BETWEEN SECURITY SERVICES 64
3.3 KEY MANAGEMENT 66
3.3.1 KEY GENERATION 66
3.3.2 KEY DISTRIBUTION 66
3.3.3 COMPLEMENTARY KEY MANAGEMENT ACTIVITIES 68
3.4 SECURITY INFRASTRUCTURE 69
3.4.1 PUBLIC KEY INFRASTRUCTURE 69
3.4.2 AUTHENTICATIO
N AND AUTHORIZATION INFRASTRUCTUR
E 75
3.4.3 NETWORK LAYER SECURITY - IPSEC 78
3.4.4 SECURE SOCKETS LAYER AND TRANSPOR
T LAYER SECURITY 91
3.4.5 SECURE/MULTIPURPOSE INTERNE
T MAIL EXTENSIONS 95
3.4.6 ONE-TIME PASSWORD SYSTEMS 100
3.4.7 FIREWALLS 101
3.4.8 INTRUSION DETECTION SYSTEMS 105
3.4.9 EXTENSIBLE MARKUP LANGUAGE SECURITY 107
3.4.10 SMAR
T CARDS 115
3.4.11 BIOMETRICS BASED TECHNOLOGY 117
3.5 SECURITY SERVICES AS TH
E BASIS FOR E-BUSINESS PROCESSES 120
3.5.1 ELECTRONIC PAYMENT SYSTEMS 120
3.5.2 WEB SERVICES 122
3.6 PRIVACY ENABLING TECHNOLOGIES 131
3.7 A DIFFERENT PARADIG
M - WIRELESS NETWORKING 133
CONTENTS XIII
4 LEGA
L ASPECT
S O
F IS
S SECURIT
Y AN
D PRIVAC
Y 137
4.1 CRYPTOGRAPH
Y IN GENERAL 137
4.2 DIGITAL SIGNATURES 140
4.3 PRIVACY ISSUES 141
4.3.1 PRIVACY AND ELECTRONIC COMMUNICATIONS 143
4.3.2 WORKPLACE PRIVACY 144
4.3.3 SPAMMING 145
4.3.4 ELECTRONIC TRACKING TECHNOLOGIES 146
4.3.5 IDENTIT
Y THEFT 146
4.4 ISS AND SOFTWARE LIABILITY 146
4.5 INTELLECTUAL PROPERT
Y RIGHTS 148
4.6 COMPUTER FORENSICS 149
5 WHER
E AR
E W
E HEADED
? 151
6 APPENDI
X 155
6.1 BRIEF MATHEMATICA
L PRELIMINARIES 156
6.1.1 INFORMATION THEORY 156
6.1.2 COMPLEXITY THEORY 161
6.1.3 ABSTRAC
T ALGEBRA 162
6.1.4 NUMBER THEORY 163
6.1.5 COMPUTING INVERSES AND EXPONENTIATIO
N IN Z
N
167
6.1.6 COMPUTATIONA
L COMPLEXITIES IN Z
N
168
6.2 CRYPTOGRAPHI
C PRIMITIVES 169
6.2.1 ONE-WAY HASH FUNCTIONS 169
6.2.2 PSEUDORANDO
M NUMBER GENERATORS 174
6.2.3 TRIPLE DES 175
6.2.4 RSA ALGORITHM 183
6.2.5 DIFFIE-HELLMAN KEY AGREEMENT ,. 184
6.3 FORMAL METHOD
S 185
6.3.1 OVERVIEW OF FORMAL METHODS 185
6.3.2 INTRODUCTIO
N TO LOGIC BAN 186
6.3.3 LANGUAGE Z OVERVIEW 193
6.3.4 EMERGING FORMAL METHODS
198
6.4 SOCIO-TECHNICAL SYSTEMS MODELING AND SIMULATION 198
6.4.1 BUSINESS DYNAMICS 199
6.4.2 AGENT TECHNOLOGIES 205
FURTHE
R READIN
G 209
LISTIN
G O
F TH
E SIMULATIO
N MODE
L 211
REFERENCE
S 213
PPN: 121872327
TITEL: MANAGING INFORMATION SYSTEMS SECURITY AND PRIVACY / DENIS TRECEK.
- BERLIN : SPRINGER, 2006
ISBN: 3-540-28103-7; 978-3-540-28103-0
BIBLIOGRAPHISCHER DATENSATZ IM SWB-VERBUND
|
adam_txt |
CONTENTS
INTRODUCTIO
N - TH
E SCOP
E O
F TH
E WOR
K AN
D IT
S METHODOLOG
Y 1
1.1 DEFINING SECURITY AND PRIVACY 2
1.2 TH
E IMPORTANC
E OF STANDARD
S 4
1.3 TECHNOLOGICAL ISSUES 7
1.4 ORGANIZATION AND TH
E HUMAN FACTOR 8
1.5 LEGAL FRAMEWORKS 9
1.6 BEFORE PROCEEDING FURTHER 10
ORGANIZATION
, SECURIT
Y AN
D PRIVAC
Y 1
3
2.1 RECENT HISTORY OF TH
E FIELD 13
2.2 FRAMEWORKS LEVEL 15
2.2.1 ASSETS 17
2.2.2 THREAT
S 17
2.2.3 VULNERABILITIES 18
2.2.4 RISKS AND IMPACTS 18
2.2.5 SAFEGUARDS AND RESIDUAL RISK 18
2.2.6 TH
E CONCEPT OF SECURITY MANAGEMENT PROCESSES 19
2.3 TECHNIQUES FOR ISS SECURITY MANAGEMENT 19
2.3.1 SECURITY OBJECTIVES AND STRATEGIES 20
2.3.2 SECURITY RELATED ORGANIZATIONAL ISSUES 21
2.3.3 RISK ANALYSIS 21
2.3.4 SAFEGUARDS SELECTION, SECURITY POLICY DEFINITION AND
ITS REALIZATION 26
2.3.5 SUPERVISION AND INCIDENT HANDLING 27
2.4 PARTICULA
R IMPLEMENTATIONS LEVEL 27
2.4.1 GENERAL HINTS FOR SELECTION OF SAFEGUARDS 28
2.4.2 ORGANIZATIONAL SAFEGUARDS 29
2.4.3 PERSONNEL SECURITY 29
2.4.4 PHYSICAL AND ENVIRONMENTAL SECURITY 30
2.4.5 ACCESS CONTROL, COMMUNICATIONS AND OPERATION
S
SECURITY 31
XII CONTENTS
2.4.6 ISS DEVELOPMENT, MAINTENANCE, AND MONITORING 33
2.4.7 INCIDENT HANDLING 36
2.4.8 BUSINESS CONTINUITY PLANNING 36
2.4.9 COMPLIANCE AND AUDITING 37
2.4.10 SECURITY AWARENESS 38
2.5 STANDARDIZE
D SAFEGUARD TEMPLATES 39
2.5.1 ORGANIZATIONAL SAFEGUARD TEMPLATES 39
2.5.2 TECHNOLOGY COMPLIANCE SAFEGUARDS 39
3 SECURIT
Y TECHNOLOGY
: CONCEPT
S AN
D MODEL
S 4
3
3.1 SECURITY MECHANISMS 44
3.1.1 PSEUDORANDOM NUMBER GENERATOR
S 44
3.1.2 ONE-WAY HASH FUNCTIONS 45
3.1.3 SYMMETRIC ALGORITHMS 47
3.1.4 ASYMMETRIC ALGORITHMS 51
3.1.5 STEGANOGRAPHY AND WATERMARKING 54
3.2 CRYPTOGRAPHI
C PROTOCOLS 56
3.2.1 A BRIEF OVERVIEW OF COMPUTER COMMUNICATIONS 57
3.2.2 SECURITY SERVICES 59
3.2.3 MODELS OF SECURITY SERVICES 59
3.2.4 TH
E RELATIONSHIPS BETWEEN SECURITY SERVICES 64
3.3 KEY MANAGEMENT 66
3.3.1 KEY GENERATION 66
3.3.2 KEY DISTRIBUTION 66
3.3.3 COMPLEMENTARY KEY MANAGEMENT ACTIVITIES 68
3.4 SECURITY INFRASTRUCTURE 69
3.4.1 PUBLIC KEY INFRASTRUCTURE 69
3.4.2 AUTHENTICATIO
N AND AUTHORIZATION INFRASTRUCTUR
E 75
3.4.3 NETWORK LAYER SECURITY - IPSEC 78
3.4.4 SECURE SOCKETS LAYER AND TRANSPOR
T LAYER SECURITY 91
3.4.5 SECURE/MULTIPURPOSE INTERNE
T MAIL EXTENSIONS 95
3.4.6 ONE-TIME PASSWORD SYSTEMS 100
3.4.7 FIREWALLS 101
3.4.8 INTRUSION DETECTION SYSTEMS 105
3.4.9 EXTENSIBLE MARKUP LANGUAGE SECURITY 107
3.4.10 SMAR
T CARDS 115
3.4.11 BIOMETRICS BASED TECHNOLOGY 117
3.5 SECURITY SERVICES AS TH
E BASIS FOR E-BUSINESS PROCESSES 120
3.5.1 ELECTRONIC PAYMENT SYSTEMS 120
3.5.2 WEB SERVICES 122
3.6 PRIVACY ENABLING TECHNOLOGIES 131
3.7 A DIFFERENT PARADIG
M - WIRELESS NETWORKING 133
CONTENTS XIII
4 LEGA
L ASPECT
S O
F IS
S SECURIT
Y AN
D PRIVAC
Y 137
4.1 CRYPTOGRAPH
Y IN GENERAL 137
4.2 DIGITAL SIGNATURES 140
4.3 PRIVACY ISSUES 141
4.3.1 PRIVACY AND ELECTRONIC COMMUNICATIONS 143
4.3.2 WORKPLACE PRIVACY 144
4.3.3 SPAMMING 145
4.3.4 ELECTRONIC TRACKING TECHNOLOGIES 146
4.3.5 IDENTIT
Y THEFT 146
4.4 ISS AND SOFTWARE LIABILITY 146
4.5 INTELLECTUAL PROPERT
Y RIGHTS 148
4.6 COMPUTER FORENSICS 149
5 WHER
E AR
E W
E HEADED
? 151
6 APPENDI
X 155
6.1 BRIEF MATHEMATICA
L PRELIMINARIES 156
6.1.1 INFORMATION THEORY 156
6.1.2 COMPLEXITY THEORY 161
6.1.3 ABSTRAC
T ALGEBRA 162
6.1.4 NUMBER THEORY 163
6.1.5 COMPUTING INVERSES AND EXPONENTIATIO
N IN Z
N
167
6.1.6 COMPUTATIONA
L COMPLEXITIES IN Z
N
168
6.2 CRYPTOGRAPHI
C PRIMITIVES 169
6.2.1 ONE-WAY HASH FUNCTIONS 169
6.2.2 PSEUDORANDO
M NUMBER GENERATORS 174
6.2.3 TRIPLE DES 175
6.2.4 RSA ALGORITHM 183
6.2.5 DIFFIE-HELLMAN KEY AGREEMENT ,. 184
6.3 FORMAL METHOD
S 185
6.3.1 OVERVIEW OF FORMAL METHODS 185
6.3.2 INTRODUCTIO
N TO LOGIC BAN 186
6.3.3 LANGUAGE Z OVERVIEW 193
6.3.4 EMERGING FORMAL METHODS
198
6.4 SOCIO-TECHNICAL SYSTEMS MODELING AND SIMULATION 198
6.4.1 BUSINESS DYNAMICS 199
6.4.2 AGENT TECHNOLOGIES 205
FURTHE
R READIN
G 209
LISTIN
G O
F TH
E SIMULATIO
N MODE
L 211
REFERENCE
S 213
PPN: 121872327
TITEL: MANAGING INFORMATION SYSTEMS SECURITY AND PRIVACY / DENIS TRECEK.
- BERLIN : SPRINGER, 2006
ISBN: 3-540-28103-7; 978-3-540-28103-0
BIBLIOGRAPHISCHER DATENSATZ IM SWB-VERBUND |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Trček, Denis |
author_facet | Trček, Denis |
author_role | aut |
author_sort | Trček, Denis |
author_variant | d t dt |
building | Verbundindex |
bvnumber | BV021238607 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)62554192 (DE-599)BVBBV021238607 |
dewey-full | 005.8068 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8068 |
dewey-search | 005.8068 |
dewey-sort | 15.8068 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02192nam a2200577 c 4500</leader><controlfield tag="001">BV021238607</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060621 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">051124s2006 gw |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">05,N41,1064</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">976398354</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540281037</subfield><subfield code="c">Gb. : EUR 80.20 (freier Pr.), sfr 127.00 (freier Pr.)</subfield><subfield code="9">3-540-28103-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540281030</subfield><subfield code="9">978-3-540-28103-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540281030</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11381846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62554192</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021238607</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8068</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trček, Denis</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing information systems security and privacy</subfield><subfield code="c">Denis Trcek</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Springer</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 235 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014281327&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014281327</subfield></datafield></record></collection> |
id | DE-604.BV021238607 |
illustrated | Not Illustrated |
index_date | 2024-07-02T13:30:32Z |
indexdate | 2024-07-09T20:28:32Z |
institution | BVB |
isbn | 3540281037 9783540281030 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014281327 |
oclc_num | 62554192 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-573 DE-83 |
owner_facet | DE-355 DE-BY-UBR DE-573 DE-83 |
physical | XIII, 235 S. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Springer |
record_format | marc |
spelling | Trček, Denis Verfasser aut Managing information systems security and privacy Denis Trcek 1. ed. Berlin Springer 2006 XIII, 235 S. txt rdacontent n rdamedia nc rdacarrier Computer security Management Information technology Security measures Datenverwaltung (DE-588)4011168-4 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Informationssystem (DE-588)4072806-7 s Datenverwaltung (DE-588)4011168-4 s Privatsphäre (DE-588)4123980-5 s Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s Kryptosystem (DE-588)4209132-9 s DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014281327&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Trček, Denis Managing information systems security and privacy Computer security Management Information technology Security measures Datenverwaltung (DE-588)4011168-4 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Informationssystem (DE-588)4072806-7 gnd Kryptosystem (DE-588)4209132-9 gnd |
subject_GND | (DE-588)4011168-4 (DE-588)4011134-9 (DE-588)4011144-1 (DE-588)4123980-5 (DE-588)4072806-7 (DE-588)4209132-9 |
title | Managing information systems security and privacy |
title_auth | Managing information systems security and privacy |
title_exact_search | Managing information systems security and privacy |
title_exact_search_txtP | Managing information systems security and privacy |
title_full | Managing information systems security and privacy Denis Trcek |
title_fullStr | Managing information systems security and privacy Denis Trcek |
title_full_unstemmed | Managing information systems security and privacy Denis Trcek |
title_short | Managing information systems security and privacy |
title_sort | managing information systems security and privacy |
topic | Computer security Management Information technology Security measures Datenverwaltung (DE-588)4011168-4 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Informationssystem (DE-588)4072806-7 gnd Kryptosystem (DE-588)4209132-9 gnd |
topic_facet | Computer security Management Information technology Security measures Datenverwaltung Datenschutz Datensicherung Privatsphäre Informationssystem Kryptosystem |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014281327&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT trcekdenis managinginformationsystemssecurityandprivacy |