EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: institution:"European Network and Information Security Agency"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 44 Datensicherheit 44 EU countries 44 EU-Staaten 44 IT crime 27 IT-Kriminalität 27 Datenschutz 13 Data protection 12 Europa 12 Europe 12 Datensicherung 6 Cybersecurity 5 IT-Sicherheit 5 Internet 5 KMU 5 SME 5 Standardisierung 5 Standardization 5 Telecommunications network 5 Telekommunikationsnetz 5 Theorie 5 Theory 5 Cloud Computing 4 Confidence 4 Information dissemination 4 Informationsverbreitung 4 Social network 4 Soziales Netzwerk 4 Vertrauen 4 Bildungspolitik 3 Cloud computing 3 Consumer behaviour 3 Data processing 3 Datenverarbeitung 3 E-commerce 3 Education policy 3 Electricity grid 3 Electronic Commerce 3 Europäische Union / Agentur für Netz- und Informationssicherheit 3 Game theory 3
more ... less ...
Online availability
All
Free 172
Type of publication
All
Book / Working Paper 169 Journal 6
Type of publication (narrower categories)
All
Graue Literatur 9 Non-commercial literature 9 Amtsdruckschrift 5 Government document 5 Annual report 3 Jahresbericht 3 Amtliche Publikation 2 Elektronischer Datenträger 2 Bericht 1 Handbook 1 Handbuch 1
more ... less ...
Language
All
English 175
Author
All
Liveri, Dimitra 8 Moulinos, Konstantinos 8 Dekker, Marnix 7 Cătălui, Daria 6 Karsberg, Christoffer 6 Marinos, Louis 6 Lévy-Bencheton, Cédric 5 Mattioli, Rossella 5 Sarri, Anna 5 Darra, Eleni 4 De Muynck, Jo 4 Trimintzios, Panagiotis 4 Chalvatzi, Eftychia 3 Dupre, Lionel 3 Ferette, Lionel 3 Galan Manso, Clara 3 Gavrila, Razvan 3 Górniak, Sławomir 3 Medina, Manel 3 Naydenov, Rossen 3 Portesi, Silvia 3 Skouloudi, Christina 3 Tirtea, Rodica 3 Tofan, Dan 3 Anderson, Philip 2 Bourka, Athena 2 Ciobanu, Cosmin 2 Di Franco, Fabio 2 Domingo-Ferrer, Josep 2 Drougkas, Athanasios 2 Dufková, Andrea 2 Dupré, Lionel 2 Fiedler, Arno 2 Hansen, Marit 2 Hoepman, Jaap-Henk 2 Lakka, Matina 2 Matsikas, Nektarios 2 Oikonomou, Demosthenes 2 Rekleitis, Evangelos 2 Smart, Nigel P. 2
more ... less ...
Institution
All
European Network and Information Security Agency 140 Europäische Union / Agentur für Netz- und Informationssicherheit 35 Deloitte 2 Deloitte Bedrijfsrevisoren 1 RAND Europe 1
Source
All
ECONIS (ZBW) 174 USB Cologne (EcoSocSci) 1
Showing 81 - 90 of 175
Cover Image
ENISA threat landscape 2014 : overview of current and emerging cyber-threats
Marinos, Louis (contributor) - European Network and Information Security Agency - 2015
No previous threat landscape document published by ENISA has shown such a wide range of change as the one of the year 2014. We were able to see impressive changes in top threats, increased complexity of attacks, successful internationally coordinated operations of law enforcement and security...
Persistent link: https://www.econbiz.de/10015299782
Saved in:
Cover Image
Threat landscape and good practice guide for Internet infrastructure
Lévy-Bencheton, Cédric (contributor);  … - European Network and Information Security Agency - 2015
The Internet infrastructure supports the global exchange of information through physical and logical assets, such as cables, servers, protocols, services... These assets suffer from various threats that can hamper network connectivity and disrupt the Internet. As a threat landscape, this study...
Persistent link: https://www.econbiz.de/10015300022
Saved in:
Cover Image
Standards and tools for exchange and processing of actionable information
Dandurand, Luc (contributor); Kaplan, Aaron (contributor);  … - European Network and Information Security Agency - 2015
This document has been created as part of an ENISA-funded study of the state of security information sharing and is intended to supplement the main report, "Actionable Information for Security Incident Response." The purpose of this document is to give the target audience of this study -...
Persistent link: https://www.econbiz.de/10015300029
Saved in:
Cover Image
Leading the way : ENISA's CSIRT-related capacity building activities : impact analysis update 2015
Ferette, Lionel (contributor) - European Network and Information Security Agency - 2015
Europe, like the rest of the world, is witnessing an unprecedented expansion in the cyber-security domain and an ever-growing community of CSIRTs (Computer Security Incident Response Team). In parallel, an evolving cyber threat landscape shows a sharp increase and levels of sophistication of...
Persistent link: https://www.econbiz.de/10015300797
Saved in:
Cover Image
Roadmap for NIS education programmes in Europe : education
Berendt, Bettina (contributor) - 2014 - October 2014
ENISA is one of the key stakeholders in Europe in the area of Network and Information Security (NIS). Given its positioning, ENISA is active in the area of education and awareness, using its knowledge to promote NIS skills and supporting the Commission in enhancing the skills and competence of...
Persistent link: https://www.econbiz.de/10015274376
Saved in:
Cover Image
Report on cyber crisis cooperation and management : comparative study on the cyber crisis management and the general crisis management
Trimintzios, Panagiotis (contributor) - 2014 - Final, v1.0, 06 Nov 2014
The goal of this study is to provide an analysis of cyber crisis management by identifying relations between this emerging field and the better established subject of general crisis management. This includes terminology and key concepts in these fields. This study further seeks to gain knowledge...
Persistent link: https://www.econbiz.de/10015274377
Saved in:
Cover Image
Good practice guide on training methodologies : how to become an effective and inspirational trainer
2014 - November 2014
Training is everything. The peach was once a bitter almond; cauliflower is nothing, but cabbage with a college education. [Mark Twain, 1835-1910] Why write a guide about training methodologies when there are so many resources and theories on "trainings" and "trainers" already? There are two...
Persistent link: https://www.econbiz.de/10015274378
Saved in:
Cover Image
Cyber security competitions - the status in Europe : recommendations for a pan-European approach
Cătălui, Daria (contributor) - 2014 - October 2014
This report focuses on analysing the current situation concerning cybersecurity challenge competitions in Europe. The experience gathered will be the basis to develop a pan-European competition on cybersecurity. The European Cyber Security Challenge Competition 2015 is set to be the result of a...
Persistent link: https://www.econbiz.de/10015274379
Saved in:
Cover Image
Algorithms, key sizes and parameters report : 2014
Smart, Nigel P. (contributor); Tirtea, Rodica (contributor) - 2014 - November 2014
During 2013, ENISA prepared and published its first reports with cryptographic guidelines supporting the security measures required to protect personal data in online systems. Recently published EC Regulations on the measures applicable to the notification of personal data breaches [118] make...
Persistent link: https://www.econbiz.de/10015274380
Saved in:
Cover Image
Study on cryptographic protocols
Smart, Nigel P. (contributor); Tirtea, Rodica (contributor) - 2014 - November, 2014
Cryptographic algorithms, when used in networks, are used within a cryptographic protocol. In the ENISA algorithms report of 2013 [113], several protocols were discussed. In this document (which is the sister document of the 2014 report [115]) we extend the work in the 2013 report to cover more...
Persistent link: https://www.econbiz.de/10015274381
Saved in:
  • First
  • Prev
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...