Security and privacy assurance in advancing technologies: new developments
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2011]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xxxvii, 456 Seiten) |
ISBN: | 9781609602024 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044297075 | ||
003 | DE-604 | ||
005 | 20220307 | ||
007 | cr|uuu---uuuuu | ||
008 | 170504s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781609602024 |9 978-1-60960-202-4 | ||
024 | 7 | |a 10.4018/978-1-60960-200-0 |2 doi | |
035 | |a (OCoLC)992536067 | ||
035 | |a (DE-599)BVBBV044297075 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Security and privacy assurance in advancing technologies |b new developments |c Hamid R. Nemati (The University of North Carolina, USA) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2011] | |
264 | 4 | |c © 2011 | |
300 | |a 1 Online-Ressource (xxxvii, 456 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a Re-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati | |
520 | |a "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy" - Provided by publisher | ||
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Management / Technological innovations | |
650 | 0 | 7 | |a Innovationsprozess |0 (DE-588)4161820-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssicherheit |0 (DE-588)1217680330 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Informationssicherheit |0 (DE-588)1217680330 |D s |
689 | 0 | 2 | |a Innovationsprozess |0 (DE-588)4161820-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Nemati, Hamid R. |d 1958- |0 (DE-588)140041923 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-60960-200-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-60960-200-5 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029701058 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-200-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-200-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-200-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-200-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138440417476608 |
---|---|
adam_text | |
any_adam_object | |
author2 | Nemati, Hamid R. 1958- |
author2_role | edt |
author2_variant | h r n hr hrn |
author_GND | (DE-588)140041923 |
author_facet | Nemati, Hamid R. 1958- |
building | Verbundindex |
bvnumber | BV044297075 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | Re-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati |
ctrlnum | (OCoLC)992536067 (DE-599)BVBBV044297075 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044297075</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220307</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170504s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781609602024</subfield><subfield code="9">978-1-60960-202-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-60960-200-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992536067</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044297075</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy assurance in advancing technologies</subfield><subfield code="b">new developments</subfield><subfield code="c">Hamid R. Nemati (The University of North Carolina, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxvii, 456 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Re-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management / Technological innovations</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innovationsprozess</subfield><subfield code="0">(DE-588)4161820-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Innovationsprozess</subfield><subfield code="0">(DE-588)4161820-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nemati, Hamid R.</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)140041923</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-60960-200-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-60960-200-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029701058</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-200-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-200-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-200-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-200-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044297075 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:31Z |
institution | BVB |
isbn | 9781609602024 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029701058 |
oclc_num | 992536067 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xxxvii, 456 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Security and privacy assurance in advancing technologies new developments Hamid R. Nemati (The University of North Carolina, USA) Hershey ; New York Information Science Reference [2011] © 2011 1 Online-Ressource (xxxvii, 456 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references Re-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy" - Provided by publisher Information technology / Security measures Management / Technological innovations Innovationsprozess (DE-588)4161820-8 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Informationssicherheit (DE-588)1217680330 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Informationstechnik (DE-588)4026926-7 s Informationssicherheit (DE-588)1217680330 s Innovationsprozess (DE-588)4161820-8 s DE-604 Nemati, Hamid R. 1958- (DE-588)140041923 edt Erscheint auch als Druck-Ausgabe 978-1-60960-200-0 Erscheint auch als Druck-Ausgabe 1-60960-200-5 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security and privacy assurance in advancing technologies new developments Re-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati Information technology / Security measures Management / Technological innovations Innovationsprozess (DE-588)4161820-8 gnd Informationstechnik (DE-588)4026926-7 gnd Informationssicherheit (DE-588)1217680330 gnd |
subject_GND | (DE-588)4161820-8 (DE-588)4026926-7 (DE-588)1217680330 (DE-588)4143413-4 |
title | Security and privacy assurance in advancing technologies new developments |
title_auth | Security and privacy assurance in advancing technologies new developments |
title_exact_search | Security and privacy assurance in advancing technologies new developments |
title_full | Security and privacy assurance in advancing technologies new developments Hamid R. Nemati (The University of North Carolina, USA) |
title_fullStr | Security and privacy assurance in advancing technologies new developments Hamid R. Nemati (The University of North Carolina, USA) |
title_full_unstemmed | Security and privacy assurance in advancing technologies new developments Hamid R. Nemati (The University of North Carolina, USA) |
title_short | Security and privacy assurance in advancing technologies |
title_sort | security and privacy assurance in advancing technologies new developments |
title_sub | new developments |
topic | Information technology / Security measures Management / Technological innovations Innovationsprozess (DE-588)4161820-8 gnd Informationstechnik (DE-588)4026926-7 gnd Informationssicherheit (DE-588)1217680330 gnd |
topic_facet | Information technology / Security measures Management / Technological innovations Innovationsprozess Informationstechnik Informationssicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0 |
work_keys_str_mv | AT nematihamidr securityandprivacyassuranceinadvancingtechnologiesnewdevelopments |