Privacy Information We use cookies to show external content, to personalize your display, to be able to offer functions for social media and to analyze the access to our website. Information about your use of our website may be passed on to our partners for external content, social media, advertising and analysis. Our partners may combine this information with other data that you have provided or that they have collected as part of your use of the services. You can either agree to all external services and associated cookies, or only to those that are absolutely necessary for the website to function correctly. Please note that if you choose the second option, not all content may be displayed. |
you need the free eBook reader Adobe Digital Editions (download). After purchasing an eBook you will receive a download link. This link can only be used once and loses its validity after the download. In order to use an eBook on several devices (PC, laptop, tablet) and also after a device change without problems, please create an account with Adobe ADE. Of course, it is also possible to use the book without an account, but then you can only use the book on the device on which you have downloaded it. It is not possible to take the book to another device without an account.
Special Offers | ||||
Nur 10 bis 20 % eines Eisberges ragen aus dem Wasser. Die gefährlichen 80 bis 90 % bleiben unsichtbar. Und auch die Gefahren für die Informationssicherheit sind zum Großteil nicht offensichtlich. DIE INHALTE: - die Bedrohungen - Risikoanalyse und Security Policy - IT-Security - Digitale Signatur - Informationssicherheit und Recht - Sicherheit im Zahlungsverkehr - Sicherheit und Recht - Marketing und Kommunikation - Sicherheitstipps und Linkverzeichnis Autoren: Maximilian Burger-Scheidlin, Bernhard Krick, Edmund E. Lindau, Thomas J. Nagy, Joe Pichlmayr, Michael Pilz, Christian Reissner, Thomas Rothen, Christian Rupp, Philipp Schaumann, Heinz Wachmann 160 Seiten, Erscheinungsjahr 2003 | ||||