![]() |
Expdt: Vergleichbarkeit Von Richtlinien Für Selbstregulierung Und Selbstdatenschutz
ISBN: 9783834810007 / Niemiecki / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Bisher bestand Datenschutz einerseits in der Selbstregulierung durch die Dienstanbieter mittels einseitig vorgegebener Datenschutzrichtlinien, andererseits im Selbstdatenschutz der Kunden mittels Datensparsamkeit. §§Martin Kähmer präsentiert mit den Extended Privacy Definition Tools (ExPDT) eine formale Richtliniensprache für die Spezifikation ausdrucksstarker Datenschutzrichtlinien. Zur Unterstützung der Vereinbarung individueller Richtlinien zwischen Anbieter und Kunden definiert er einen Differenzoperator, mit dem sich Datenschutzrichtlinien automatisiert vergleichen und Konflikte...
Bisher bestand Datenschutz einerseits in der Selbstregulierung durch die Dienstanbieter mittels einseitig vorgegebener Datenschutzrichtlinien, anderer...
|
cena:
262,70 |
![]() |
Linguistisches Identity Matching: Paradigmenwechsel in Der Suche Und Im Abgleich Von Personendaten
ISBN: 9783834813718 / Niemiecki / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. Identity Matching ist die Grundlage für die Suche mit und nach Personendaten. Und die betreibt heutzutage die ganze Welt: Banken suchen Geldwäscher in ihren Kundendateien, Polizeibehörden überprüfen Verdächtige mit ihren Registern und Privatpersonen stöbern alte Bekannte im Web auf. Mittels Identity Matching besorgen sich Studenten Fachartikel, Journalisten Nachrichten, Vermieter Bonitätsauskünfte und Verkäufer ihre nächsten Marketing-Opfer. Das Problem bisher ist: Sobald wir den Namen nicht genau so schreiben, wie er in der Quelle repräsentiert ist, finden wir ihn nicht. Jetzt...
Identity Matching ist die Grundlage für die Suche mit und nach Personendaten. Und die betreibt heutzutage die ganze Welt: Banken suchen Geldwäscher ...
|
cena:
37,52 |
![]() |
Codierungstheorie: Eine Einführung
ISBN: 9783528164195 / Niemiecki / Miękka / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das Lehrbuch uber Codierungstheorie fur Mathematik- und Informatik-Studenten setzt ausser elementarem Grundwissen keine besonderen Kenntnisse voraus. Angesprochen werden Themen aus den Gebieten: Quellencodierung, Prufzeichenverfahren, fehlerkorrigierende Codes und Kryptosysteme. Begriffe, Methoden und Satze sind bis ins Detail ausfuhrlich dargestellt und durch viele einfache Beispiele erlautert.
Erganzend zur 1. Auflage sind als Themen u.a. hinzugekommen: DVD-Datentrager, MDS-Codes und Bogen, Codes uber Z4, Quantencodes, Zero-Knowledge-Protokolle, Quantenkryptographie und elliptische... Das Lehrbuch uber Codierungstheorie fur Mathematik- und Informatik-Studenten setzt ausser elementarem Grundwissen keine besonderen Kenntnisse voraus. ...
|
cena:
131,33 |
![]() |
Privatsphäre Durch Die Delegation Von Rechten
ISBN: 9783834807212 / Niemiecki / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Personalisierte Dienstleistungen setzen eine Weitergabe personlicher Daten zwischen Dienstleistern voraus. Der Autor schlagt mit der Delegation von Rechten eine Verbesserung des gegenwartig in der Praxi angewendeten Vertrauensmodells zur Einhaltung der Datenschutzrechte vor. Er stellt ein Identitatsmanagementsystem vor, mit dem Nutzer die Regeln zur Datenerhebung und Weitergabe nach den rechtlichen und funktionalen Anforderungen des Customer Relationship Management (CRM) durchsetzten und kontrollieren konnen. Eine Proof-of-Concept Implementierung zeigt die Funktionsweise und Schutzwirkung der...
Personalisierte Dienstleistungen setzen eine Weitergabe personlicher Daten zwischen Dienstleistern voraus. Der Autor schlagt mit der Delegation von Re...
|
cena:
262,70 |
![]() |
IOS Forensic Analysis: For Iphone, Ipad, and iPod Touch
ISBN: 9781430233428 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS informationand data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community."
iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and proc...
|
cena:
220,86 |
![]() |
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers
ISBN: 9783642177729 / Angielski / Miękka / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic,...
|
cena:
200,77 |
![]() |
Digital Privacy: PRIME - Privacy and Identity Management for Europe
ISBN: 9783642190490 / Angielski / Miękka / 775 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science. PRIME has focused on privacy-enhancing identity management techniques and systems to support users' sovereignty over their personal privacy and enterprises' privacy-compliant data processing. During the course of four years, the project has involved over a hundred researchers and professionals from 22 major European academic and industrial organizations conducting R&D work in areas relevant to... This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the... |
cena:
401,58 |
![]() |
Transactions on Computational Science X: Special Issue on Security in Computing, Part I
ISBN: 9783642174988 / Angielski / Miękka / 366 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This issue of the Transactions on Computational Science journal focuses on security in computing. It covers a wide range of applications and designs, such as new architectures, novel hardware implementations, cryptographic algorithms and security protocols. This issue of the Transactions on Computational Science journal focuses on security in computing. It covers a wide range of applications and design... |
cena:
200,77 |
![]() |
Gröbner Bases, Coding, and Cryptography
ISBN: 9783642101007 / Angielski / Miękka / 430 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Grobner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations. This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including... Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to ... |
cena:
401,58 |
![]() |
Securing Biometrics Applications
ISBN: 9781441943507 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify... Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased... |
cena:
411,29 |
![]() |
Risiko-Assessments Für Datenqualität: Konzept Und Realisierung
ISBN: 9783834813442 / Niemiecki / Miękka / 150 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hakim Harrach gibt einen Uberblick uber die Gebiete des Datenqualitats- und Risikomanagements und untersucht die Schnittstellen von Prozessen. Er prasentiert ein Konzept zur Realisierung eines standardisierten Risiko-Assessments fur Datenqualitat. Dieses setzt er durch die Implementierung des Prototyps am Anwendungsbeispiel Banken um. Abschlieend zeigt er mogliche Ansatze zur Weiterentwicklung des IQ-Assessment-Tools auf.
Hakim Harrach gibt einen Uberblick uber die Gebiete des Datenqualitats- und Risikomanagements und untersucht die Schnittstellen von Prozessen. Er pras...
|
cena:
262,70 |
![]() |
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
ISBN: 9781609608361 / Angielski / Twarda / 292 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...
|
cena:
972,17 |
![]() |
Managing Information Risk and the Economics of Security
ISBN: 9781441935298 / Angielski / Miękka / 347 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
|
cena:
602,40 |
![]() |
Advances in Cryptology - Eurocrypt '92: Workshop on the Theory and Application of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992 Pro
ISBN: 9783540564133 / Angielski / Miękka / 491 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A series of workshops devoted to modern cryptography began in Santa Barbara, California in 1981 and was followed in 1982 by a European counterpart in Burg Feuerstein, Germany. The series has been maintained with summer meetings in Santa Barbara and spring meetings somewhere in Europe. At the 1983 meeting in Santa Barbara the International Association for Cryptologic Research was launched and it now sponsors all the meetings of the series. This volume presents the proceedings of Eurocrypt '92, held in Hungary. The papers are organized into the following parts: Secret sharing, Hash functions,...
A series of workshops devoted to modern cryptography began in Santa Barbara, California in 1981 and was followed in 1982 by a European counterpart in ...
|
cena:
200,77 |
![]() |
Advances in Cryptology - Eurocrypt '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21
ISBN: 9783540594093 / Angielski / Miękka / 417 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of...
EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616visio...
|
cena:
200,77 |
![]() |
Advances in Cryptology -- Crypto '95: 15th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 27-31, 1995. Proceedings
ISBN: 9783540602217 / Angielski / Miękka / 466 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and...
The Crypto '95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciet...
|
cena:
200,77 |
![]() |
Advances in Cryptology – EUROCRYPT ’96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings
ISBN: 9783540611868 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His...
The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Sa...
|
cena:
200,77 |
![]() |
Advances in Cryptology — CRYPTO ’96: 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18–22, 1996, Proceedings
ISBN: 9783540615125 / Angielski / Miękka / 415 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB). It takes place at UCSB from August 18 to 22, 1996. The General Chair, Richard Graveman, is responsible for local organization and registration. The scientific program was organized by the 16-member Program C- mittee. We considered 115 papers. (An additional 15 submissions had to be...
Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with...
|
cena:
200,77 |
![]() |
Jit'98 Java-Informations-Tage 1998: Frankfurt/Main, 12./13. November 1998
ISBN: 9783540649717 / Niemiecki / Miękka / 374 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Anwendungsbezogen und entwicklungsorientiert wird in diesem Band die Java-Technologie diskutiert. Ausgehend von praktischen Erfahrungen diskutieren die Autoren Java unter verschiedenen Aspekten bis hin zu neuartigen Anwendungen und Paradigmen.
Anwendungsbezogen und entwicklungsorientiert wird in diesem Band die Java-Technologie diskutiert. Ausgehend von praktischen Erfahrungen diskutieren di...
|
cena:
206,40 |
![]() |
Data Privacy Management and Autonomous Spontaneous Security: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010 Athens, G
ISBN: 9783642193477 / Angielski / Miękka / 259 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to...
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Ma...
|
cena:
200,77 |