apress
  • Search
  • Menu
  • Cart V
    Your cart is currently empty.
  • Login
    • Account
    • Bookshelf
    • Login
  • Apress Access
  • Categories
    • Apple & iOS
    • Big Data & Analytics
    • Business
    • Databases
    • Enterprise Software
    • Game Development
    • Graphics
    • Hardware & Maker
    • Java
    • Machine Learning
    • Microsoft & .NET
    • Mobile
    • Networking & Cloud
    • Open Source
    • Programming
    • Python
    • Security
    • Web Development
    • Publishing Partners
  • Services
    • About Us
    • Academics
    • Affiliate Program
    • Book Reviewers
    • Customer Support
    • Events
    • News & Newsletter
    • Rights & Permissions
    • Source Code
    • Submit Errata
    • Technical Reviewers
    • User Groups
  • Apress Open
  • Blog
  • Write
  • Shop
    • Shop Apress.com
    • Booksellers
    • Bulk Sales
    • Corporate Sales
    • Librarians

This selection contains Springer Nature titles

Refine Search

Refine Search

Content Type

  1. Book 11
Error[en_EN | Frontend.ProductSearchPage | section.resultlist.showremaining]

Topics

  1. IT in Business 11 Remove
  2. Systems and Data Security 11 Remove
Error[en_EN | Frontend.ProductSearchPage | section.resultlist.showremaining]

Release Date

  1. Older 11
Error[en_EN | Frontend.ProductSearchPage | section.resultlist.showremaining]

Language

  1. English 6
  2. German 5
Error[en_EN | Frontend.ProductSearchPage | section.resultlist.showremaining]

Publisher

Showing 11 results.

Within IT in Business Systems and Data Security

Cybersecurity Investments Book

Cybersecurity Investments

Beissel, S. (2016)

This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance between financial expenditures and risk …

Available Formats: Hardcover eBook Softcover

Attribute-based Credentials for Trust Book

Attribute-based Credentials for Trust

Rannenberg, K. (Ed), Camenisch, J. (Ed), Sabouri, A. (Ed) (2015)

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are …

Available Formats: Hardcover eBook Softcover

Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing Book

Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing

Bub, U. (Ed), Wolfenstetter, K. (Ed) (2014)

Cloud Computing, Big Data, Cyber Security, Industrie 4.0 etc. sind vielleicht nur Schlagworte, aber sie sind auch Ausdruck neuer, komplexer Problemstellungen, deren Behandlung und …

Available Formats: Softcover eBook

Enterprise Identity Management Book

Enterprise Identity Management

Royer, D. (2013)

​The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for …

Available Formats: eBook Hardcover Softcover

Datenschutz kompakt und verständlich Textbook

Datenschutz kompakt und verständlich

Witt, B. C. (2010)

Das Thema "Datenschutz" geht jeden an, der an verantwortlicher Stelle mit IT zu tun hat, d. h. nicht nur den Datenschutzbeauftragten. Es geht um die Verarbeitung personenbezogener …

Available Formats: Softcover eBook

Security Informatics Book

Security Informatics

Yang, C. C. (Ed), Chau, M. (Ed), Wang, J. (Ed), Chen, H. (Ed) (2010)

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and …

Available Formats: Softcover eBook

The Future of Identity in the Information Society Book

The Future of Identity in the Information Society

Rannenberg, K. (Ed), Royer, D. (Ed), Deuker, A. (Ed) (2009)

Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a …

Available Formats: Softcover Hardcover eBook

Der IT Security Manager Book

Der IT Security Manager

Kersten, H. (Ed), Kersten, H., Klett, G., Wolfenstetter, K. (Ed) (2008)

Vorwort zur 2. Auflage Nachdem die Erstauflage des Buches im Herbst 2007 vergriffen war, stellte sich die Frage nach einem unveränderten Nachdruck oder der Herausgabe einer …

Available Formats: eBook

Trusted Computing Book

Trusted Computing

Pohlmann, N. (Ed), Reimer, H. (Ed) (2008)

Trusted Computing markiert einen grundsätzlichen Wandel der IT-Sicherheitsarchitekturen. Erstmals werden die Potenziale von sicherer integrierten Hard- und Software verfügbar. …

Available Formats: eBook

IT-Sicherheit kompakt und verständlich Textbook

IT-Sicherheit kompakt und verständlich

Witt, B. C. (2006)

IT-Systeme müssen zum einen "verlässlich" sein, d. h. sich an den klassischen Sicherheitszielen Verfügbarkeit, Integrität und Vertraulichkeit orientieren. Zum anderen müssen sie …

Available Formats: eBook Softcover

Information Security for Managers Book

Information Security for Managers

Caelli, W., Longley, D. (1989)

The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There are few managers with first …

Available Formats: Softcover eBook

previous Page is not a valid page number. Please enter a number between and . of 1
Apress A-Z
  • Apple & iOS
  • ASP.NET
  • Big Data & Analytics
  • Business
  • Databases
  • Enterprise Software
  • Game Development
  • Graphics
  • Hardware & Maker
  • Java
  • Machine Learning
  • Microsoft & .NET
  • Mobile
  • Networking & Cloud
  • Open Source
  • Programming
  • Publishing Partners
  • Python
  • Security
  • Web Development
  • Publishing Partners
Services
  • About Us
  • Academics
  • Affiliate Program
  • Book Reviewers
  • Customer Support
  • Events
  • News & Newsletter
  • Rights & Permissions
  • Source Code
  • Submit Errata
  • Technical Reviewers
  • User Groups
Write for Us
  • Write
  • Submit a proposal
  • Publishing process
  • Documents for Current Authors
Company
  • About Us
  • Blog
  • Events
  • FAQ
  • News
  • Publishing Partners
  • Contact Us
  • Team
 
¶ ¢ “ ¡
  • © 2018 Apress is part of Springer Nature
  • Terms & Conditions
  • Privacy Policy
  • 1
  • 2
  • 3