Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Security of systems. Foundations, concepts, realizations, applications - MaRDI portal

Deprecated: Use of MediaWiki\Skin\SkinTemplate::injectLegacyMenusIntoPersonalTools was deprecated in Please make sure Skin option menus contains `user-menu` (and possibly `notifications`, `user-interface-preferences`, `user-page`) 1.46. [Called from MediaWiki\Skin\SkinTemplate::getPortletsTemplateData in /var/www/html/w/includes/Skin/SkinTemplate.php at line 691] in /var/www/html/w/includes/Debug/MWDebug.php on line 372

Deprecated: Use of QuickTemplate::(get/html/text/haveData) with parameter `personal_urls` was deprecated in MediaWiki Use content_navigation instead. [Called from MediaWiki\Skin\QuickTemplate::get in /var/www/html/w/includes/Skin/QuickTemplate.php at line 131] in /var/www/html/w/includes/Debug/MWDebug.php on line 372

Security of systems. Foundations, concepts, realizations, applications (Q2717814)

From MaRDI portal





scientific article; zbMATH DE number 1605898
Language Label Description Also known as
English
Security of systems. Foundations, concepts, realizations, applications
scientific article; zbMATH DE number 1605898

    Statements

    19 June 2001
    0 references
    Systemsicherheit
    0 references
    security of systems
    0 references
    Security of systems. Foundations, concepts, realizations, applications (English)
    0 references
    The articles of this volume will not be indexed individually.NEWLINENEWLINENEWLINEAus dem Vorwort: Als gemeinsame Veranstaltung der GI-FAchgruppe 2.5.3 Verläßliche IT-Systeme, des ITG-Fachausschusses 6.2 System- und Anwendungssoftware, der Österreichischen Computer Gesellschaft und TeleTrusT Deutschland ist die Arbeitskonferenz Systemsicherheit nach den Veranstaltungen Trust Center, Digital Signature, Chipkarten und Sicherheitsinfrastrukturen die fünfte einer Reihe, die sich einem speziellen Thema im Kontext der IT-Sicherheit widmet.
    0 references

    Identifiers