E-Commerce Security and Privacy:
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in i...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2001
|
Ausgabe: | 1st ed. 2001 |
Schriftenreihe: | Advances in Information Security
2 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself. If you have an idea for a book that is appro priate for this series, I encourage you to contact either the Acquisitions Editor for the series, Lance Wobus (lwobus@wkap.com), or myself, the Consulting Editor for the series (jajodia@gmu.edu). We would be happy about to discuss any potential projects with you. Additional information this series can be obtained from www.wkap.nljseries.htmjADIS. |
Beschreibung: | 1 Online-Ressource (XXIII, 163 p) |
ISBN: | 9781461514671 |
DOI: | 10.1007/978-1-4615-1467-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064222 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2001 |||| o||u| ||||||eng d | ||
020 | |a 9781461514671 |9 978-1-4615-1467-1 | ||
024 | 7 | |a 10.1007/978-1-4615-1467-1 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-1467-1 | ||
035 | |a (OCoLC)1227483210 | ||
035 | |a (DE-599)BVBBV047064222 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 658.872 |2 23 | |
084 | |a ST 340 |0 (DE-625)143665: |2 rvk | ||
245 | 1 | 0 | |a E-Commerce Security and Privacy |c edited by Anup K. Ghosh |
250 | |a 1st ed. 2001 | ||
264 | 1 | |a New York, NY |b Springer US |c 2001 | |
300 | |a 1 Online-Ressource (XXIII, 163 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security |v 2 | |
520 | |a Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself. If you have an idea for a book that is appro priate for this series, I encourage you to contact either the Acquisitions Editor for the series, Lance Wobus (lwobus@wkap.com), or myself, the Consulting Editor for the series (jajodia@gmu.edu). We would be happy about to discuss any potential projects with you. Additional information this series can be obtained from www.wkap.nljseries.htmjADIS. | ||
650 | 4 | |a e-Commerce/e-business | |
650 | 4 | |a Trade | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Computer Science, general | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a E-commerce | |
650 | 4 | |a Trade | |
650 | 4 | |a Business | |
650 | 4 | |a Commerce | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer science | |
650 | 4 | |a Management information systems | |
700 | 1 | |a Ghosh, Anup K. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461355687 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792373995 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461514688 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-1467-1 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471334 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-1467-1 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061959872512 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Ghosh, Anup K. |
author2_role | edt |
author2_variant | a k g ak akg |
author_facet | Ghosh, Anup K. |
building | Verbundindex |
bvnumber | BV047064222 |
classification_rvk | ST 340 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-1467-1 (OCoLC)1227483210 (DE-599)BVBBV047064222 |
dewey-full | 658.872 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.872 |
dewey-search | 658.872 |
dewey-sort | 3658.872 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.1007/978-1-4615-1467-1 |
edition | 1st ed. 2001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03401nmm a2200589zcb4500</leader><controlfield tag="001">BV047064222</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461514671</subfield><subfield code="9">978-1-4615-1467-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-1467-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-1467-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227483210</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064222</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.872</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 340</subfield><subfield code="0">(DE-625)143665:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-Commerce Security and Privacy</subfield><subfield code="c">edited by Anup K. Ghosh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2001</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIII, 163 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">2</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself. If you have an idea for a book that is appro priate for this series, I encourage you to contact either the Acquisitions Editor for the series, Lance Wobus (lwobus@wkap.com), or myself, the Consulting Editor for the series (jajodia@gmu.edu). We would be happy about to discuss any potential projects with you. Additional information this series can be obtained from www.wkap.nljseries.htmjADIS.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">e-Commerce/e-business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Trade</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Trade</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghosh, Anup K.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461355687</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792373995</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461514688</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-1467-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471334</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-1467-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064222 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781461514671 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471334 |
oclc_num | 1227483210 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXIII, 163 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Information Security |
spelling | E-Commerce Security and Privacy edited by Anup K. Ghosh 1st ed. 2001 New York, NY Springer US 2001 1 Online-Ressource (XXIII, 163 p) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 2 Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself. If you have an idea for a book that is appro priate for this series, I encourage you to contact either the Acquisitions Editor for the series, Lance Wobus (lwobus@wkap.com), or myself, the Consulting Editor for the series (jajodia@gmu.edu). We would be happy about to discuss any potential projects with you. Additional information this series can be obtained from www.wkap.nljseries.htmjADIS. e-Commerce/e-business Trade Computer Communication Networks Theory of Computation Computer Science, general Management of Computing and Information Systems E-commerce Business Commerce Computer communication systems Computers Computer science Management information systems Ghosh, Anup K. edt Erscheint auch als Druck-Ausgabe 9781461355687 Erscheint auch als Druck-Ausgabe 9780792373995 Erscheint auch als Druck-Ausgabe 9781461514688 https://doi.org/10.1007/978-1-4615-1467-1 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | E-Commerce Security and Privacy e-Commerce/e-business Trade Computer Communication Networks Theory of Computation Computer Science, general Management of Computing and Information Systems E-commerce Business Commerce Computer communication systems Computers Computer science Management information systems |
title | E-Commerce Security and Privacy |
title_auth | E-Commerce Security and Privacy |
title_exact_search | E-Commerce Security and Privacy |
title_exact_search_txtP | E-Commerce Security and Privacy |
title_full | E-Commerce Security and Privacy edited by Anup K. Ghosh |
title_fullStr | E-Commerce Security and Privacy edited by Anup K. Ghosh |
title_full_unstemmed | E-Commerce Security and Privacy edited by Anup K. Ghosh |
title_short | E-Commerce Security and Privacy |
title_sort | e commerce security and privacy |
topic | e-Commerce/e-business Trade Computer Communication Networks Theory of Computation Computer Science, general Management of Computing and Information Systems E-commerce Business Commerce Computer communication systems Computers Computer science Management information systems |
topic_facet | e-Commerce/e-business Trade Computer Communication Networks Theory of Computation Computer Science, general Management of Computing and Information Systems E-commerce Business Commerce Computer communication systems Computers Computer science Management information systems |
url | https://doi.org/10.1007/978-1-4615-1467-1 |
work_keys_str_mv | AT ghoshanupk ecommercesecurityandprivacy |