ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Wiesbaden
Springer
2015
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 315 Seiten) 76 Illustrationen |
ISBN: | 9783658109349 |
DOI: | 10.1007/978-3-658-10934-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043209035 | ||
003 | DE-604 | ||
005 | 20190122 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783658109349 |c Online |9 978-3-658-10934-9 | ||
024 | 7 | |a 10.1007/978-3-658-10934-9 |2 doi | |
035 | |a (OCoLC)932116928 | ||
035 | |a (DE-599)BVBBV043209035 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a ISSE 2015 |b Highlights of the Information Security Solutions Europe 2015 Conference |c edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider |
264 | 1 | |a Wiesbaden |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 315 Seiten) |b 76 Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Berlin |2 gnd-content | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Reimer, Helmut |d 1937- |0 (DE-588)1098433181 |4 edt | |
700 | 1 | |a Pohlmann, Norbert |0 (DE-588)17312691X |4 edt | |
700 | 1 | |a Schneider, Wolfgang |d 1947- |0 (DE-588)1098434218 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-658-10933-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-658-10934-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632196 | ||
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-658-10934-9 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175707362820096 |
---|---|
adam_text | ISSE 2015
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK PRESENTS THE MOST INTERESTING TALKS GIVEN AT ISSE 2015 – THE
FORUM FOR THE INTERDISCIPLINARY DISCUSSION OF HOW TO ADEQUATELY SECURE
ELECTRONIC BUSINESS PROCESSES. THE TOPICS INCLUDE:
ENCRYPTED COMMUNICATION TRUST
SERVICES, EID AND CLOUD SECURITY INDUSTRIAL SECURITY
AND INTERNET OF THINGS CYBERSECURITY, CYBERCRIME,
CRITICAL INFRASTRUCTURES BYOD AND MOBILE SECURITY
REGULATION AND POLICIES
BIOMETRIC APPLICATIONS ADEQUATE INFORMATION SECURITY
IS ONE OF THE BASIC REQUIREMENTS OF ALL ELECTRONIC BUSINESS PROCESSES.
IT IS CRUCIAL FOR EFFECTIVE SOLUTIONS THAT THE POSSIBILITIES OFFERED BY
SECURITY TECHNOLOGY CAN BE INTEGRATED WITH THE COMMERCIAL REQUIREMENTS
OF THE APPLICATIONS. THE READER MAY EXPECT STATE-OF-THE-ART: BEST PAPERS
OF THE CONFERENCE ISSE 2015. CONTENT ENCRYPTED
COMMUNICATION TRUST SERVICES, EID, CLOUD SECURITY
AND MANAGEMENT INDUSTRIAL SECURITY AND INTERNET OF
THINGS BYOD, MOBILE SECURITY AND APPLICATIONS
CYBERSECURITY, CYBERCRIME, CRITICAL
INFRASTRUCTURES SECURITY MANAGEMENT
REGULATIONS AND POLICIES TARGET GROUPS
CHIEF INFORMATION SECURITY OFFICERS
DEVELOPERS OF ELECTRONIC BUSINESS PROCESSES
IT MANAGERS IT SECURITY EXPERTS
RESEARCHERS EDITORS NORBERT POHLMANN: PROFESSOR FOR
INFORMATION SECURITY AND DIRECTOR OF THE INSTITUTE FOR INTERNET SECURITY
AT THE WESTPHALIAN UNIVERSITY OF APPLIED SCIENCES GELSENKIRCHEN.
ADDITIONALLY HE IS CHAIRMAN OF TELETRUST – IT SECURITY
ASSOCIATIONGERMANY. HELMUT REIMER: SENIOR CONSULTANT, TELETRUST – IT
SECURITY ASSOCIATION GERMANY WOLFGANG SCHNEIDER: SENIOR ADVISER,
FRAUNHOFER INSTITUTE SIT.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Reimer, Helmut 1937- Pohlmann, Norbert Schneider, Wolfgang 1947- |
author2_role | edt edt edt |
author2_variant | h r hr n p np w s ws |
author_GND | (DE-588)1098433181 (DE-588)17312691X (DE-588)1098434218 |
author_facet | Reimer, Helmut 1937- Pohlmann, Norbert Schneider, Wolfgang 1947- |
building | Verbundindex |
bvnumber | BV043209035 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932116928 (DE-599)BVBBV043209035 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-658-10934-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03893nmm a2200745zc 4500</leader><controlfield tag="001">BV043209035</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190122 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783658109349</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-658-10934-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-658-10934-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932116928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209035</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ISSE 2015</subfield><subfield code="b">Highlights of the Information Security Solutions Europe 2015 Conference</subfield><subfield code="c">edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Wiesbaden</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 315 Seiten)</subfield><subfield code="b">76 Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Berlin</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reimer, Helmut</subfield><subfield code="d">1937-</subfield><subfield code="0">(DE-588)1098433181</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pohlmann, Norbert</subfield><subfield code="0">(DE-588)17312691X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schneider, Wolfgang</subfield><subfield code="d">1947-</subfield><subfield code="0">(DE-588)1098434218</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-658-10933-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632196</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-658-10934-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Berlin gnd-content (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Konferenzschrift 2015 Berlin Aufsatzsammlung |
id | DE-604.BV043209035 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:34Z |
institution | BVB |
isbn | 9783658109349 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632196 |
oclc_num | 932116928 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XIII, 315 Seiten) 76 Illustrationen |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
spelling | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider Wiesbaden Springer 2015 1 Online-Ressource (XIII, 315 Seiten) 76 Illustrationen txt rdacontent c rdamedia cr rdacarrier Computer science Computer security Computer Science Systems and Data Security Informatik Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Berlin gnd-content (DE-588)4143413-4 Aufsatzsammlung gnd-content Electronic Commerce (DE-588)4592128-3 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Reimer, Helmut 1937- (DE-588)1098433181 edt Pohlmann, Norbert (DE-588)17312691X edt Schneider, Wolfgang 1947- (DE-588)1098434218 edt Erscheint auch als Druckausgabe 978-3-658-10933-2 https://doi.org/10.1007/978-3-658-10934-9 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference Computer science Computer security Computer Science Systems and Data Security Informatik Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4592128-3 (DE-588)1071861417 (DE-588)4143413-4 |
title | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference |
title_auth | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference |
title_exact_search | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference |
title_full | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider |
title_fullStr | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider |
title_full_unstemmed | ISSE 2015 Highlights of the Information Security Solutions Europe 2015 Conference edited by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider |
title_short | ISSE 2015 |
title_sort | isse 2015 highlights of the information security solutions europe 2015 conference |
title_sub | Highlights of the Information Security Solutions Europe 2015 Conference |
topic | Computer science Computer security Computer Science Systems and Data Security Informatik Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd |
topic_facet | Computer science Computer security Computer Science Systems and Data Security Informatik Computersicherheit Datensicherung Electronic Commerce Konferenzschrift 2015 Berlin Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-658-10934-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632196&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT reimerhelmut isse2015highlightsoftheinformationsecuritysolutionseurope2015conference AT pohlmannnorbert isse2015highlightsoftheinformationsecuritysolutionseurope2015conference AT schneiderwolfgang isse2015highlightsoftheinformationsecuritysolutionseurope2015conference |