Cyber law, privacy, and security: concepts, methodologies, tools, and applications
"This book examines current Internet and data protection laws and their impacts on user experience and cybercrime and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext |
Zusammenfassung: | "This book examines current Internet and data protection laws and their impacts on user experience and cybercrime and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522588986 |
DOI: | 10.4018/978-1-5225-8897-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV045920811 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 190606s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781522588986 |9 978-1-5225-8898-6 | ||
035 | |a (OCoLC)1104880705 | ||
035 | |a (DE-599)BVBBV045920811 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
245 | 1 | 0 | |a Cyber law, privacy, and security |b concepts, methodologies, tools, and applications |c Information Resources Management Association, USA |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a The human factor : cyber security's greatest challenge / George Platsis, 22nd Century World, Canada | |
520 | |a "This book examines current Internet and data protection laws and their impacts on user experience and cybercrime and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats"-- | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security / Law and legislation | |
650 | 4 | |a Data protection / Law and legislation | |
650 | 4 | |a Internet / Political aspects | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer security / Law and legislation |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Data protection / Law and legislation |2 fast | |
650 | 7 | |a Internet / Political aspects |2 fast | |
710 | 2 | |a Information Resources Management Association |0 (DE-588)5010976-5 |4 isb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-8897-9 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-8897-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-8897-9 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8897-9 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8897-9 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8897-9 |l DE-91 |p ZDB-1-IGE |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8897-9 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8897-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079018873028608 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV045920811 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | The human factor : cyber security's greatest challenge / George Platsis, 22nd Century World, Canada |
ctrlnum | (OCoLC)1104880705 (DE-599)BVBBV045920811 |
doi_str_mv | 10.4018/978-1-5225-8897-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV045920811</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190606s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522588986</subfield><subfield code="9">978-1-5225-8898-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104880705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045920811</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber law, privacy, and security</subfield><subfield code="b">concepts, methodologies, tools, and applications</subfield><subfield code="c">Information Resources Management Association, USA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The human factor : cyber security's greatest challenge / George Platsis, 22nd Century World, Canada</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines current Internet and data protection laws and their impacts on user experience and cybercrime and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Political aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Information Resources Management Association</subfield><subfield code="0">(DE-588)5010976-5</subfield><subfield code="4">isb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-8897-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-8897-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8897-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8897-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8897-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8897-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8897-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8897-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045920811 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:19Z |
institution | BVB |
institution_GND | (DE-588)5010976-5 |
isbn | 9781522588986 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031303308 |
oclc_num | 1104880705 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-1-IGE TUM_Paketkauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Cyber law, privacy, and security concepts, methodologies, tools, and applications Information Resources Management Association, USA Hershey, PA IGI Global [2019] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier The human factor : cyber security's greatest challenge / George Platsis, 22nd Century World, Canada "This book examines current Internet and data protection laws and their impacts on user experience and cybercrime and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats"-- Computer security Data protection Computer crimes Computer security / Law and legislation Data protection / Law and legislation Internet / Political aspects Computer crimes fast Computer security fast Computer security / Law and legislation fast Data protection fast Data protection / Law and legislation fast Internet / Political aspects fast Information Resources Management Association (DE-588)5010976-5 isb Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-8897-9 https://doi.org/10.4018/978-1-5225-8897-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cyber law, privacy, and security concepts, methodologies, tools, and applications The human factor : cyber security's greatest challenge / George Platsis, 22nd Century World, Canada Computer security Data protection Computer crimes Computer security / Law and legislation Data protection / Law and legislation Internet / Political aspects Computer crimes fast Computer security fast Computer security / Law and legislation fast Data protection fast Data protection / Law and legislation fast Internet / Political aspects fast |
title | Cyber law, privacy, and security concepts, methodologies, tools, and applications |
title_auth | Cyber law, privacy, and security concepts, methodologies, tools, and applications |
title_exact_search | Cyber law, privacy, and security concepts, methodologies, tools, and applications |
title_full | Cyber law, privacy, and security concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_fullStr | Cyber law, privacy, and security concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_full_unstemmed | Cyber law, privacy, and security concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_short | Cyber law, privacy, and security |
title_sort | cyber law privacy and security concepts methodologies tools and applications |
title_sub | concepts, methodologies, tools, and applications |
topic | Computer security Data protection Computer crimes Computer security / Law and legislation Data protection / Law and legislation Internet / Political aspects Computer crimes fast Computer security fast Computer security / Law and legislation fast Data protection fast Data protection / Law and legislation fast Internet / Political aspects fast |
topic_facet | Computer security Data protection Computer crimes Computer security / Law and legislation Data protection / Law and legislation Internet / Political aspects |
url | https://doi.org/10.4018/978-1-5225-8897-9 |
work_keys_str_mv | AT informationresourcesmanagementassociation cyberlawprivacyandsecurityconceptsmethodologiestoolsandapplications |