Showing 1 - 10 of 57,840
nicht voll vertrauenswŸrdigen Dienstanbieter betrachtet. Wir untersuchen die Grenzen der Sicherheit, die in diesem Szenario … erreicht werden kšnnen. Sicherheit wird dabei unter Zuhilfenahme aktueller komplexitŠtstheoretischer Arbeiten definiert. Dies … ermšglicht die Verwendung formaler Methoden zur Untersuchung der Bedingungen, unter denen verschiedene Grade von Sicherheit …
Persistent link: https://www.econbiz.de/10009467071
The chemical industry is one of the largest industrial sectors in the world and is expected to grow fourfold by 2060. Indeed modern life without chemicals would be inconceivable. Given the potential environmental and human health risks from exposure to chemicals, governments and industry have a...
Persistent link: https://www.econbiz.de/10012452637
Persistent link: https://www.econbiz.de/10011979683
Persistent link: https://www.econbiz.de/10010243137
Persistent link: https://www.econbiz.de/10010394421
Persistent link: https://www.econbiz.de/10014022378
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security … -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security …Secure by design -- Chapter 12 Physical Information Security -- Chapter 13 Security culture -- Chapter 14 Cybersecurity …
Persistent link: https://www.econbiz.de/10015135607
Persistent link: https://www.econbiz.de/10004864486
Persistent link: https://www.econbiz.de/10008652948
that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W … actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more … CYBERSECURITY RISK MANAGEMENT FOR THE ENTERPRISE 197 CHAPTER 10 Toward Security Metrics Maturity 199 CHAPTER 11 How Well Are My …
Persistent link: https://www.econbiz.de/10011523557