logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Information Security Opportunities And Limitations 1st Edition Thomas Liedtke

  • SKU: BELL-89314512
Information Security Opportunities And Limitations 1st Edition Thomas Liedtke
$ 31.00 $ 45.00 (-31%)

4.8

64 reviews

Information Security Opportunities And Limitations 1st Edition Thomas Liedtke instant download after payment.

Publisher: Springer
File Extension: EPUB
File size: 4.05 MB
Pages: 176
Author: Thomas Liedtke
ISBN: 9783658457112, 3658457112
Language: English
Year: 2024
Edition: 1

Product desciption

Information Security Opportunities And Limitations 1st Edition Thomas Liedtke by Thomas Liedtke 9783658457112, 3658457112 instant download after payment.

“It’s not about predicting the future, but about being prepared for the future.”(Pericles, around 500 – 429 BC; Athenian politician and general)

1.1 Motivation

Not least due to the increasing number of corresponding press releases, awareness and knowledge about the topic of information security and everything associated with it are increasing: Cyber attack, Hacker, Cyber Army, Malware, Blockchain, credit card numbers on the internet, publication of passwords, unauthorized data outflow to third countries, insecure communication in messenger services, unauthorized eavesdropping, unauthorized use of private data from third parties for unwanted purposes, Ad-Blocker, Profiling, personal penetration with unwanted advertising. This raises questions like:

● Can you surf the internet without being observed at all?

● How secure are assistance functions in the car?

● Does everyone know what you write in messenger services?

● Who is monitoring whom in the background?

● Which data has already been misappropriated?

● Who can you turn to in case of incidents and events when you discover unexplainable “strange”

connections (e.g. personal data in places where you do not suspect/want them)?

● How can you protect yourself against eavesdropping/profiling by third parties?

● Which controls are effective if you want to protect yourself?

● What needs to be done in the development of technical systems to remain compliant with the

law (e.g. according to EU General Data Protection Regulation requirements) and to be up to

date with science and technology (e.g. according to current cryptography)?

“Safety” (in the sense of functional safety) and “Security” (usually in the snese of information

security) are equally “felt” at their corresponding (usually negative) effects when they are no

longer given.

This book is intended to help bring order and light into the darkness of various aspects of security (information, product, process, cybersecurity, …) In particular, many examples of practical

Related Products