Book
Licensed
Unlicensed
Requires Authentication
IT-Sicherheit
Konzepte – Verfahren – Protokolle
Language:
German
Published/Copyright:
2018
About this book
The book systematically presents the essential aspects and applicable procedures for planning secure information technology systems. It describes procedures and protocols in detail and explains them using case examples. The 10th edition covers important new issues, such as blockchain technology and secure messaging, making it an essential resource for anyone who deals with IT security.
- Das Standardwerk zur IT-Sicherheit; umfassend, praxisrelevant, aktuell
- Neu in der 10 Auflage: Blockchain, Secure Messager (Whats App, Signal)-Protokolle
Author / Editor information
Claudia Eckert, TU München, Fraunhofer-AISEC (Institutsleitung).
Reviews
„Eine gute und vollständige Zusammenstellung aller wichtigen Themen."
Prof. Dr.-Ing. Martin Hübner, HAW Hamburg
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFRequires Authentication UnlicensedLicensed
Vorwort
v -
Download PDFPublicly Available
Inhaltsverzeichnis
ix -
Download PDFRequires Authentication UnlicensedLicensed
1. Einführung
1 -
Download PDFRequires Authentication UnlicensedLicensed
2. Spezielle Bedrohungen
43 -
Download PDFRequires Authentication UnlicensedLicensed
3. Internet-(Un)Sicherheit
97 -
Download PDFRequires Authentication UnlicensedLicensed
4. Security Engineering
171 -
Download PDFRequires Authentication UnlicensedLicensed
5. Bewertungskriterien
213 -
Download PDFRequires Authentication UnlicensedLicensed
6. Sicherheitsmodelle
239 -
Download PDFRequires Authentication UnlicensedLicensed
7. Kryptografische Verfahren
279 -
Download PDFRequires Authentication UnlicensedLicensed
8. Hashfunktionen Und Elektronische Signaturen
365 -
Download PDFRequires Authentication UnlicensedLicensed
9. Schlüsselmanagement
397 -
Download PDFRequires Authentication UnlicensedLicensed
10. Authentifikation
443 -
Download PDFRequires Authentication UnlicensedLicensed
11. Digitale Identität
503 -
Download PDFRequires Authentication UnlicensedLicensed
12. Zugriffskontrolle
615 -
Download PDFRequires Authentication UnlicensedLicensed
13. Fallstudien: Ios-Ecosystem Und Windows10
663 -
Download PDFRequires Authentication UnlicensedLicensed
14. Sicherheit In Netzen
715 -
Download PDFRequires Authentication UnlicensedLicensed
15. Sichere Mobile Und Drahtlose Kommunikation
851 -
Download PDFRequires Authentication UnlicensedLicensed
Literaturverzeichnis
969 -
Download PDFRequires Authentication UnlicensedLicensed
Abkürzungsverzeichnis
983 -
Download PDFRequires Authentication UnlicensedLicensed
Index
993
Publishing information
Pages and Images/Illustrations in book
eBook published on:
August 21, 2018
eBook ISBN:
9783110563900
Edition:
10th expanded and updated edition
Pages and Images/Illustrations in book
Front matter:
17
Main content:
1004
Illustrations:
200
Tables:
40
eBook ISBN:
9783110563900
Audience(s) for this book
Studenten Informatik, Informationstechnik. Anwender in Behörden und Industrie