Data SecurityPub Date : 1900-01-01DOI: 10.1007/978-3-658-35494-7_5
Thomas H. Lenhard
{"title":"Hazards in the Technical Environment","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_5","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_5","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122744900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data SecurityPub Date : 1900-01-01DOI: 10.1007/978-3-658-35494-7_15
Thomas H. Lenhard
{"title":"Identification of Computers and IP Addresses","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_15","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_15","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data SecurityPub Date : 1900-01-01DOI: 10.1007/978-3-658-35494-7_2
Thomas H. Lenhard
{"title":"Data Protection and Data Security","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_2","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_2","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data SecurityPub Date : 1900-01-01DOI: 10.1007/978-3-658-35494-7_18
Thomas H. Lenhard
{"title":"Configuration of Security Systems","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_18","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_18","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data SecurityPub Date : 1900-01-01DOI: 10.1007/978-3-658-35494-7
Thomas H. Lenhard
{"title":"Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132428511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data SecurityPub Date : 1900-01-01DOI: 10.1007/978-3-658-35494-7_20
Thomas H. Lenhard
{"title":"Organizational Data Security","authors":"Thomas H. Lenhard","doi":"10.1007/978-3-658-35494-7_20","DOIUrl":"https://doi.org/10.1007/978-3-658-35494-7_20","url":null,"abstract":"","PeriodicalId":255398,"journal":{"name":"Data Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}