Narrow Search
Last searches

Results for *

Displaying results 1 to 25 of 130.

  1. Konfliktmanagement für Sicherheitsprofis
    Auswege aus der "Buhmann-Falle" für Informations- und IT-Sicherheitsbeauftragte, Datenschützer, CISOs und Co.
    Published: [2020]; © 2020
    Publisher:  Springer Vieweg, Wiesbaden

    Hochschul- und Kreisbibliothek Bonn-Rhein-Sieg
    11 = TWZ4515(3)
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
  2. IT audit, control, and security
    Published: c2010
    Publisher:  Wiley, Hoboken, N.J

    Universität Potsdam, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0471406767; 9780471406761
    Subjects: Information technology; Electronic data processing departments; Computer security; Computer networks
    Scope: XXIV, 667 S., graph. Darst., 26 cm
    Notes:

    Includes bibliographical references and index

  3. Understanding new security threats
    Contributor: Gueldry, Michel R. (HerausgeberIn); Gokcek, Gigi (HerausgeberIn); Hebron, Lui (HerausgeberIn)
    Published: 2019
    Publisher:  Routledge, Taylor & Francis Group, London

    This textbook examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. Proposing an expansive view of non-traditional forms of security that go beyond traditionally recognized... more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    This textbook examines non-traditional forms of security and expands the notion of security to include non-state actors and non-human actors. Proposing an expansive view of non-traditional forms of security that go beyond traditionally recognized issues of threats to state and national territory, this new textbook rests on the following premises: traditional state-centered threats, such as nuclear proliferation and espionage, remain a concern; old and new threats combine and create interlocking puzzles - a feature of wicked problems and wicked messes; because of the global erosion of borders, new developments of unconventional insecurity interact in ways that frustrate traditional conceptual definitions, conceptual maps, and national policies; unconventional security challenges which have traditionally been seen as "low politics" or "soft" issues are now being recognized as "hard security" challenges in the twenty-first century; many of the so-called "new" threats detailed here are in fact very old: diseases, gender violence, food insecurity, under-development, and crime are all traditional security threats, but deeply modified today by globalization. The chapters offer local and global examples and engage with various theoretical approaches to help readers see the bigger picture. Solutions are also suggested to these problems. Each chapter contains discussion questions to help readers understand the key points and facilitate class discussion.

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Staatsbibliothek zu Berlin
    Contributor: Gueldry, Michel R. (HerausgeberIn); Gokcek, Gigi (HerausgeberIn); Hebron, Lui (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781315102061
    Other identifier:
    RVK Categories: MF 9500 ; MK 8000
    Subjects: Security, International; National security; Human security; Energy security; Biosecurity; Computer security; Non-state actors (International relations); Terrorism; Computer Security; Kollektive Sicherheit; Bedrohungsvorstellung; Vorstellung; Sicherheitspolitik; Ursache; Einflussgröße; Risikofaktor; Wandel; Entwicklung; Security, International; National security; Human security; Energy security; Biosecurity; Computer security; Non-state actors (International relations); Terrorism ; Prevention; Electronic books; HISTORY / Military / Other; TECHNOLOGY & ENGINEERING / Military Science
    Scope: 1 Online-Ressource (xviii, 254 Seiten), Diagramme
    Notes:

    Literaturangaben, Register

    Michel Gueldry, Gigi gokcek and Lui Hebron: Introduction : Yesterday’s security debates, today’s realities

    Amy Below: Climate change : the existential security threat multiplier

    Michael D. Beevers: Geoengineering : a new and emerging security threat?

    Neda A. Zawahri and Erika Weinthal: The intersecting dimensions of water security

    Michael A. Davis and Jonathan Drake: Competition and cooperation in energy policies : dilemmas for national security and influence

    Marissa Quie: The body politics of security : sexual and reproductive health rights

    Nicole Gerring: Gender-based violence : a threat to human security in the global north and global south

    Erika Resende and Adriana Erthal Abnedur: Food security governance : lessons from the global south

    Adrienne Formentos and Gigi Gokcek: Invisible foes and micro-enemies : pathogens, diseases, and global health security

    Joel R. Campbell: Push, pull, and politics : the international migration issues after the Syrian Civil War, Brexit, and Trump

    Sharad Joshi: Sub-state actors' threats to international security : religious extremists and terrorist groups

    Colin P. Clarke: Organized crime and trafficking : mapping out the threats and actors to find solutions

    Serena Simoni: Transnational organized crime and globalization : godmothers of the Mafia and the undermining of the Italian state and society

    Christian-Marc Lifländer: Emerging threats in cyber space : the next domain of warfare

    Daniel Addington and Mike Manrod: Cyber threats and solutions for the private sector

    Jason Sebastiani, Joe Sanchez and Mike Manrod: Threats from STEM

    Khalid Bachkar and Lui Hebron: Risk and uncertainty in the global container supply chain

    Crister S. Garrett: Steeped in insecurity? : democracy, conflict, and the threat of populist security

  4. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Author: Mauro, Aaron
    Published: 2022
    Publisher:  Bloomsbury Academic, London

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... more

    Access:
    Resolving-System (lizenzpflichtig)
    Freie Universität Berlin, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Humboldt-Universität zu Berlin, Universitätsbibliothek, Jacob-und-Wilhelm-Grimm-Zentrum
    Unlimited inter-library loan, copies and loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Universität Potsdam, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Staatsbibliothek zu Berlin; Philologische Bibliothek, FU Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350231009
    Other identifier:
    Series: Bloomsbury studies in digital cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Digital Humanities; Computersicherheit
    Scope: 1 Online-Ressource (xii, 201 Seiten)
    Notes:

    Bevorzugte Informationsquelle Landingpage (Bloomsbury), da weder Titelblatt noch Impressum vorhanden

  5. Women in security
    changing the face of technology and innovation
    Contributor: Christofferson, Debra A. (Publisher)
    Published: [2018]; © 2018
    Publisher:  Springer, Cham

    Freie Universität Berlin, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule für Technik und Wirtschaft Berlin, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Brandenburgische Technische Universität Cottbus - Senftenberg, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Philologische Bibliothek, FU Berlin
    Contributor: Christofferson, Debra A. (Publisher)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9783319577951
    Other identifier:
    Series: Women in engineering and science
    Subjects: Engineering; Computer security; System safety; Engineering / Vocational guidance; Sociology; Sex (Psychology); Gender expression; Gender identity; Engineering; Job Careers in Science and Engineering; Gender Studies; Systems and Data Security; Security Science and Technology; Geschlechterforschung; Datensicherung; Ingenieurwissenschaften; Computersicherheit
    Scope: 1 Online-Ressource (XIX, 136 Seiten), Illustrationen
  6. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Author: Mauro, Aaron
    Published: 28 March 2022
    Publisher:  Bloomsbury Academic, London

    Universitäts- und Landesbibliothek Münster, Zentralbibliothek
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350231009
    Other identifier:
    Edition: First edition
    Series: Bloomsbury studies in digital cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities
    Scope: 1 Online-Ressource
  7. Stealing the network
    how to own the box
    Published: ©2003
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Series: Cyber-Fiction Ser
    Subjects: Hackers; Computer security; Short stories, American
    Other subjects: Short stories
    Scope: 1 Online-Ressource (xxii, 303 pages)
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  8. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Subjects: Fiction; Suspense fiction; Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Other subjects: Short stories
    Scope: 1 Online-Ressource (1 online resource)
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  9. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: ©2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction Ser
    Subjects: Fiction; Computer hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 Online-Ressource (1 online resource)
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  10. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: ©2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction Ser
    Subjects: Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 Online-Ressource
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  11. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital ... future
    Author: Mauro, Aaron
    Published: 2022; 2021
    Publisher:  Bloomsbury, London [England] ; Bloomsbury Publishing

    Katholische Hochschule Nordrhein-Westfalen (katho), Hochschulbibliothek
    No inter-library loan
    Universitäts- und Stadtbibliothek Köln, Hauptabteilung
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016
    Other identifier:
    Edition: First edition
    Series: Bloomsbury Studies in Digital Cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities / Digital libraries; Computer security,Digital lifestyle,Media, information & communication industries,Literary studies: from c 1900 -
    Scope: 1 online resource (232 pages)
    Notes:

    Includes bibliographical references and index

    Also published in print

  12. Konfliktmanagement für Sicherheitsprofis
    Auswege aus der „Buhmann-Falle“ für Informations- und IT-Sicherheitsbeauftragte, Datenschützer, CISOs und Co
    Published: [2020]; © 2020
    Publisher:  Springer Vieweg, Wiesbaden

    Hochschul- und Kreisbibliothek Bonn-Rhein-Sieg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
  13. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Author: Mauro, Aaron
    Published: 2022
    Publisher:  Bloomsbury Academic, London

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... more

    Universitätsbibliothek Eichstätt-Ingolstadt
    Unlimited inter-library loan, copies and loan
    Bayerische Staatsbibliothek
    Unlimited inter-library loan, copies and loan

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350231009
    Other identifier:
    Series: Bloomsbury studies in digital cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Digital Humanities; Computersicherheit
    Scope: 1 Online-Ressource (xii, 201 Seiten)
    Notes:

    Bevorzugte Informationsquelle Landingpage (Bloomsbury), da weder Titelblatt noch Impressum vorhanden

  14. Futureproof
    security aesthetics and the management of life
    Contributor: Ghertner, D. Asher (Publisher); McFann, Hudson (Publisher); Goldstein, Daniel M. (Publisher)
    Published: 2020
    Publisher:  Duke University Press, Durham ; London

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Hochschulbibliothek Ansbach
    Unlimited inter-library loan, copies and loan
    Staatliche Bibliothek, Schloßbibliothek
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Augsburg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Augsburg
    Unlimited inter-library loan, copies and loan
    Staatsbibliothek Bamberg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Bamberg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Bayreuth
    Unlimited inter-library loan, copies and loan
    Landesbibliothek Coburg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Eichstätt-Ingolstadt
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Erlangen-Nürnberg, Hauptbibliothek
    Unlimited inter-library loan, copies and loan
    Kunsthistorisches Institut in Florenz, Max-Planck-Institut, Bibliothek
    Hochschule Weihenstephan-Triesdorf, Zentralbibliothek
    No loan of volumes, only paper copies will be sent
    Hochschulbibliothek Ingolstadt
    Unlimited inter-library loan, copies and loan
    Hochschule Kempten, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule Landshut, Hochschule für Angewandte Wissenschaften, Bibliothek
    Unlimited inter-library loan, copies and loan
    Bayerische Akademie der Wissenschaften, Bibliothek
    No inter-library loan
    Bayerische Staatsbibliothek
    Unlimited inter-library loan, copies and loan
    Deutsches Museum, Bibliothek
    No loan of volumes, only paper copies will be sent
    Hochschule München, Bibliothek
    Unlimited inter-library loan, copies and loan
    Landesamt für Digitalisierung, Breitband und Vermessung, Bibliothek
    No inter-library loan
    Technische Universität München, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek der LMU München
    Unlimited inter-library loan, copies and loan
    Zentralinstitut für Kunstgeschichte, Bibliothek
    No loan of volumes, only paper copies will be sent
    Hochschule für angewandte Wissenschaften Neu-Ulm, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Universität der Bundeswehr München, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Staatliche Bibliothek Neuburg/Donau
    Unlimited inter-library loan, copies and loan
    Evangelische Hochschule Nürnberg, Bibliothek
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Nürnberg Georg Simon Ohm, Bibliothek
    No loan of volumes, only paper copies will be sent
    Deutsches Forum für Kunstgeschichte, Bibliothek
    Staatliche Bibliothek Passau
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Passau
    Unlimited inter-library loan, copies and loan
    Leibniz-Institut für Ost- und Südosteuropaforschung, Bibliothek
    No loan of volumes, only paper copies will be sent
    OTH- Ostbayerische Technische Hochschule Regensburg, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Staatliche Bibliothek Regensburg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Regensburg
    Unlimited inter-library loan, copies and loan
    Bibliotheca Hertziana - Max-Planck-Institut für Kunstgeschichte
    Hochschule für angewandte Wissenschaften Würzburg-Schweinfurt, Abteilungsbibliothek Schweinfurt
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Würzburg-Schweinfurt Bibliothek
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Würzburg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Source: Union catalogues
    Contributor: Ghertner, D. Asher (Publisher); McFann, Hudson (Publisher); Goldstein, Daniel M. (Publisher)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781478007517
    Other identifier:
    Series: Global insecurities
    Subjects: Human security; Emergency management; Risk management; Biosecurity; Computer security; Zukunft; Menschliche Sicherheit; Katastrophenmanagement; Ästhetik; Risikomanagement
    Scope: 1 Online-Ressource (xii, 298 Seiten), Illustrationen
  15. Enterprise Java security
    building secure J2EE applications
    Published: c2004
    Publisher:  Addison-Wesley, Boston, Mass. [u.a.]

    Technische Hochschule Ostwestfalen-Lippe, Service Kommunikation Information Medien
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0321118898
    Edition: 1. print.
    Subjects: Java (Computer program language); Computer security
    Scope: XXIII, 579 S. : Ill., graph. Darst.
    Notes:

    Includes bibliographical references (p. 563) and index. - Formerly CIP

  16. Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment
    4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II
    Contributor: Zhou, Jia (HerausgeberIn); Salvendy, Gavriel (HerausgeberIn)
    Published: 2018
    Publisher:  Springer International Publishing, Cham

    This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in... more

    Access:
    Resolving-System (lizenzpflichtig)
    Universität Potsdam, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan

     

    This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. ITAP 2018 includes a total of 84 papers. They were organized in topical sections as follows: Part I: aging and technology acceptance; aging and interaction; intergenerational communication and social participation. Part II: health care technologies and services for the elderly; intelligent environments for aging; and games and entertainment for the elderly Health Care Technologies and Services for the Elderly -- Building an Ontology for Eldercare Service in China with a Hierarchical Clustering Method -- Interoperability and Convergence for Welfare Technology -- A Knowledge Graph for Eldercare: Constructing a Domain Entity Graph with Guidelines -- Augmented Reality in Tablets for the Yerkes Test for Older Adults -- Innovation Method of Health Products Design for Elderly Adults Based on Perceived Quality and User Experience -- A User-centred Ethical Assessment of Welfare Technologies for Elderly -- Obstacles of Utilizing a Self-management APP for Taiwanese Type II Diabetes Patients -- Impact of Virtual Reality (VR) Experience on Older Adults' Well-Being -- Positive Impact of Exergaming on Older Adults’ Mental and Social Well-being: In Search of Evidence -- AR-PETS: Development of an Augmented Reality Supported Pressing Evaluation Training System -- Technology-Enabled Medication Adherence for Seniors Living in the Community: Experiences, Lessons, and The Road Ahead -- The Old People Using Intelligent Mobile Equipment Influence Extent -- Factor Analysis of Perceived Quality and User Experience of Health Products for Elderly Adults -- Usability Assessment of a Web-based Self-Directed Learning (SDL) System for Chinese Dementia Caregivers -- The Effect of Hypertension Health Management (HHM) using IT for the Elderly: A Case Study in an Underdeveloped Area of China -- Decisions about Medical Data Disclosure in the Internet: An Age Perspective -- Intelligent Environments for Aging -- A Framework for Pervasive & Ubiquitous Geriatric Monitoring -- User-specific Concepts of Aging - A Qualitative Approach on AAL-Acceptance Regarding Ultrasonic Whistles -- Kinecting Frailty: A Pilot Study on Frailty -- Detecting Parkinson’s Disease Using Gait Analysis with Particle Swarm Optimization -- Methods to Design Home Support for Elders -- Unobtrusive detection of frailty in older adults -- Monitoring Thermal Comfort with IoT Technologies: A Pilot Study in Chinese Eldercare Centers -- Reflections on the effectiveness of a high density ambient sensor deployment for monitoring Healthy Aging -- Interpersonal Distancing in Cooperation - Effect of Confederate’s Interpersonal Distance Preferences -- Identifying Elderlies at Risk of Becoming More Depressed with Internet-of-Things -- Smart TV for Older Adults: A Comparative Study of the Mega Menu and Tiled Menu -- Privacy at Home: an Inquiry into Sensors and Robots for the Stay at Home Elderly -- Perspectives on Design of Sensor based Exergames Targeted Towards Older Adults -- Privacy and Future Consent in Smart Homes as Assisted Living Technologies -- Needs and Attitudes of Friendly Chinese Restaurant among Older Adults: Results from a Pilot Study -- Investigating Older Adults’ Preferences for Functions within a Human-Machine Interface Designed for Fully Autonomous Vehicles -- An Experimental Study on Intelligent Kitchen Appliances’ Interface Information Preference Based on Visual Characteristics of the Elderly -- Games and Entertainment for the Elderly -- Gen X and Digital Games: Looking Back to Look Forward -- An analysis of Crossword Learning: a mobile application for the elderly -- Creating an Online Escape Room Game for Older Adults: Needs Assessment, Design Process, and Usability Testing -- Innovative game concepts for Alzheimer patients -- Pumpkin Garden: A Mobile Game Platform for Monitoring Parkinson's Disease Symptoms -- Pilot study of Piano Learning with AR Smart glasses Considering Both Single and Paired Play -- Attitudes and Perceptions of Older Chinese People in Hong Kong towards Silver Gaming

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Zhou, Jia (HerausgeberIn); Salvendy, Gavriel (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9783319920375
    Other identifier:
    Series: Lecture Notes in Computer Science ; 10927
    Information Systems and Applications, incl. Internet/Web, and HCI ; 10927
    Array
    Subjects: Computer science; Computer Science; Computer science; Computer organization; Computer security; Computer organization; Computer security; User interfaces (Computer systems); Artificial intelligence; Computer graphics; User interfaces (Computer systems); Artificial intelligence; Computer graphics; Application software.; Computer networks .; Human-computer interaction.; Data protection.; Computer engineering.
    Scope: Online-Ressource (XXIII, 590 p. 180 illus, online resource)
  17. Cyber risk for the financial sector
    a framework for quantitative assessment
    Published: June 2018
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Cyber risk has emerged as a key threat to financial stability, following recent attacks on financial institutions. This paper presents a novel documentation of cyber risk around the world for financial institutions by analyzing the different types of... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Cyber risk has emerged as a key threat to financial stability, following recent attacks on financial institutions. This paper presents a novel documentation of cyber risk around the world for financial institutions by analyzing the different types of cyber incidents (data breaches, fraud and business disruption) and identifying patterns using a variety of datasets. The other novel contribution that is outlined is a quantitative framework to assess cyber risk for the financial sector. The framework draws on a standard VaR type framework used to assess various types of stability risk and can be easily applied at the individual country level. The framework is applied in this paper to the available cross-country data and yields illustrative aggregated losses for the financial sector in the sample across a variety of scenarios ranging from 10 to 30 percent of net income

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (kostenfrei)
    Volltext (kostenfrei)
  18. Terminal compromise
    Published: 199X
    Publisher:  Project Gutenberg, Champaign, Ill

    Hochschule für Gesundheit, Hochschulbibliothek
    eBook EBSCO
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0585151865; 9780585151861
    Subjects: Computer security; Records; Records; Computer security
    Scope: Online Ressource
  19. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital ... future
    Author: Mauro, Aaron
    Published: 2022; 2021
    Publisher:  Bloomsbury, London [England] ; Bloomsbury Publishing

    Hochschulbibliothek der Fachhochschule Aachen
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek der RWTH Aachen
    Unlimited inter-library loan, copies and loan
    Fachhochschule Bielefeld, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Bielefeld
    Unlimited inter-library loan, copies and loan
    Hochschule Bochum, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Ruhr-Universität Bochum, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Universitäts- und Landesbibliothek Bonn
    Unlimited inter-library loan, copies and loan
    Fachhochschule Dortmund, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Dortmund
    Unlimited inter-library loan, copies and loan
    Universitäts- und Landesbibliothek Düsseldorf
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Duisburg-Essen
    Unlimited inter-library loan, copies and loan
    Fachhochschule Südwestfalen, Elektronische Ressourcen
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek der Fernuniversität
    Unlimited inter-library loan, copies and loan
    Katholische Hochschule Nordrhein-Westfalen (katho), Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Köln, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Universitäts- und Stadtbibliothek Köln, Hauptabteilung
    Unlimited inter-library loan, copies and loan
    Zentralbibliothek der Sportwissenschaften der Deutschen Sporthochschule Köln
    Unlimited inter-library loan, copies and loan
    Hochschule Niederrhein, Bibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule Ruhr West, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule Ruhr West, Hochschulbibliothek, Zweigbibliothek Bottrop
    Unlimited inter-library loan, copies and loan
    Universitäts- und Landesbibliothek Münster
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Paderborn
    Unlimited inter-library loan, copies and loan
    Hochschul- und Kreisbibliothek Bonn-Rhein-Sieg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Siegen
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Wuppertal
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016
    Other identifier:
    Edition: First edition
    Series: Bloomsbury Studies in Digital Cultures
    Other subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities / Digital libraries; Computer security,Digital lifestyle,Media, information & communication industries,Literary studies: from c 1900 -; Electronic books
    Scope: 1 online resource (232 pages)
    Notes:

    Includes bibliographical references and index

    Also published in print

  20. Vulnerability Management
    Published: 2019
    Publisher:  Auerbach Publications, Milton ; O'Reilly Media Inc., Sebastopol, CA

    Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a... more

    Access:
    Bibliothek der Hochschule Darmstadt, Zentralbibliothek
    No inter-library loan
    Universitätsbibliothek J. C. Senckenberg, Zentralbibliothek (ZB)
    No inter-library loan
    Bibliothek der Hochschule Mainz, Untergeschoss
    No inter-library loan
    Universität Marburg, Universitätsbibliothek
    No inter-library loan

     

    Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1000011933; 9781000011937; 1000005097; 9781000005097; 0415015464; 9780415015462; 0429289650; 9780429289651
    RVK Categories: EC 1850 ; EC 1874 ; EC 2220 ; EC 2230 ; HM 1331 ; HN 1331
    Edition: 2nd ed
    Subjects: Frau; Frauenroman; Englisch; Frauenliteratur; Schriftstellerin; Weiblichkeit; Postmoderne; Ästhetik; Literatur; Information technology; Computer security; Computer security; Information technology
    Other subjects: Woolf, Virginia (1882-1941); Woolf, Virginia (1882-1941)
    Scope: 1 Online-Ressource (330 pages)
    Notes:

    Description based upon print version of record

  21. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... more

    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 1931836051; 9781932266788; 9781931836050
    Subjects: Computer hackers; Computer security; Cyberterrorism; Hackers
    Scope: Online-Ressource
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Title from e-book title screen (viewed June 10, 2004)

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  22. Stealing the network
    how to own the box
    Published: 2003
    Publisher:  Syngress Pub, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix Stealing the Network: How to Own the Box is NOT intended to be a install, configure, update, troubleshoot, and defend book. It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the street fighting tactics used to attack networks and systems. Not just another hacker book, it plays on edgy market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile White Hats, Black Hats and Gray Hats Gives readers a first ever look inside some of the most notorious network intrusions

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Series: Cyber-Fiction Ser
    Subjects: Computer hackers; Computer security; Short stories, American; Hackers
    Scope: Online-Ressource (xxii, 303 p), ill, 24 cm
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."--Cover

    Electronic reproduction; Mode of access: World Wide Web

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  23. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Author: Mauro, Aaron
    Published: [2022]
    Publisher:  Bloomsbury Academic, London

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... more

    Access:
    Resolving-System (lizenzpflichtig)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."--

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350230989
    Other identifier:
    Series: Bloomsbury Studies in Digital Cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Computer security,Digital lifestyle,Media, information & communication industries,Literary studies: from c 1900 -
    Scope: 1 Online-Ressource (xii, 212 Seiten)
    Notes:

    Includes bibliographical references and index

    Preface -- 1. Human Exploits: An Introduction to Hacking and the Humanities -- 2. "Hack the Planet": Pop Hackers and the Demands of a Real World Resistance -- 3. Academic Attack Surfaces: Culture Jamming the Future and XML Bombs -- 4. Supply Chain Attacks and Knowledge Networks: Network Sovereignty and the Interplanetary Internet -- 5.Cryptographic Agility and the Right to Privacy: Secret Writing and the Cypherpunks -- 6. Biohacking and Autonomous Androids: Human Evolution and Biometric Data -- 7. Gray Hat Humanities: Surveillance Capitalism, Object Oriented Ontology, and Design Fiction -- Selected Bibliography -- Index

  24. Encyclopedia of information ethics and security
    Published: 2008
    Publisher:  Information Science Reference, Hershey, Pa. [u.a.]

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance,... more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781591409878
    RVK Categories: CC 7100 ; ST 277
    Subjects: Information technology; Information technology; Computer crimes; Computer security; Information networks
    Scope: XVII, 661, [1] - 8 S., Ill., graph. Darst.
    Notes:

    Literaturangaben

  25. Open-Source-Software und IT-Sicherheit
    Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg
    Published: 2005
    Publisher:  MFG-Stiftung Baden-Württemberg, Stuttgart

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Inhaltsverzeichnis (kostenfrei)
    Source: Staatsbibliothek zu Berlin
    Language: German
    Media type: Book
    Format: Print
    Series: Array ; Bd. 1
    Subjects: Open Source; Datensicherheit; Informationsmanagement; Unternehmen; Baden-Württemberg; Computer security; Computer systems; Cryptography; Open source software
    Scope: 103 S., graph. Darst., 30 cm
    Notes:

    Literaturangaben

    Enth. 3 Beitr