Listing 1 - 10 of 60025 | << page >> |
Sort by
|
Choose an application
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology.
Choose an application
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology.
Choose an application
Choose an application
Choose an application
This book offers a new and comprehensive approach to understanding energy security. Drawing on the latest research in security studies, the author treats energy security as a value that is continually in dynamic conflict with other core values, such as economic prosperity and sustainability. The different physical properties of the key energy resources - coal, oil, gas, nuclear and renewables - are of course critical for the differing manifestations of energy insecurity. But it is the social, economic and political contexts, developed over time and place, which are essential for a fuller appreciation of contemporary energy challenges.
Choose an application
ISDFS provides a platform for researchers and experts in academia, industry and government to exchange ideas and recent developments in digital forensics and security After the several successful events, the fourth ISDFS conference will continue to promote and disseminate knowledge concerning several topics and technologies related to Digital Forensics and Security.
Choose an application
Choose an application
Choose an application
Informationsvertraulichkeits- und Datenschutz-Netze (ICPN) unterstützen Prozessmodellierer und -verantwortliche dabei, Datenschutz und Vertraulichkeit nicht nur rein technisch zu betrachten, sondern in Organisationen bereits frühzeitig beim Entwurf von Geschäftsprozessen zu berücksichtigen. Die in dem Buch veröffentlichte Petri-Netz-Erweiterung ICN ermöglicht es, Vertraulichkeit und Aspekte des Datenschutzes innerhalb von Geschäftsprozessmodellen systematisch zu betrachten. Information Confidentiality and Data Protection Networks (ICPN) support process modelers and process managers in not only taking a purely technical view of data protection and confidentiality, but also in taking it into account at an early stage in the design of business processes. The Petri-net extension ICN published in the book makes it possible to systematically consider confidentiality and data protection aspects within business process models.
Choose an application
Listing 1 - 10 of 60025 | << page >> |
Sort by
|