Privacy is hard and seven other myths: achieving privacy through careful design
"This book debunks 10 myths about how hard it really is to design privacy-friendly systems"--
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, Massachusetts ; London, England
The MIT Press
[2021]
|
Schlagworte: | |
Online-Zugang: | FHI01 FUBA1 Volltext |
Zusammenfassung: | "This book debunks 10 myths about how hard it really is to design privacy-friendly systems"-- |
Beschreibung: | 1 Online-Ressource (xii, 261 Seiten) |
ISBN: | 9780262365512 |
DOI: | 10.7551/mitpress/12587.001.0001 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047612624 | ||
003 | DE-604 | ||
005 | 20221209 | ||
007 | cr|uuu---uuuuu | ||
008 | 211126s2021 xxu|||| o||u| ||||||eng d | ||
020 | |a 9780262365512 |9 978-0-262-36551-2 | ||
024 | 7 | |a 10.7551/mitpress/12587.001.0001 |2 doi | |
035 | |a (OCoLC)1286860437 | ||
035 | |a (DE-599)BVBBV047612624 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-188 |a DE-B170 |a DE-573 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Hoepman, Jaap-Henk |d ca. 20. Jh. |e Verfasser |0 (DE-588)1246563746 |4 aut | |
245 | 1 | 0 | |a Privacy is hard and seven other myths |b achieving privacy through careful design |c Jaap-Henk Hoepman |
264 | 1 | |a Cambridge, Massachusetts ; London, England |b The MIT Press |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a 1 Online-Ressource (xii, 261 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a "This book debunks 10 myths about how hard it really is to design privacy-friendly systems"-- | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security | |
653 | 0 | |a Data protection | |
653 | 0 | |a Privacy | |
653 | 0 | |a COMPUTERS / Computer Science | |
653 | 0 | |a COMPUTERS / Internet / Online Safety & Privacy | |
653 | 0 | |a COMPUTERS / Data Science / Data Modeling & Design | |
689 | 0 | 0 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-262-04582-7 |
856 | 4 | 0 | |u https://doi.org/10.7551/mitpress/12587.001.0001 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-260-MPD |a ZDB-37-IEM | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032997434 | ||
966 | e | |u https://ieeexplore.ieee.org/servlet/opac?bknumber=9570180 |l FHI01 |p ZDB-37-IEM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.7551/mitpress/12587.001.0001 |l FUBA1 |p ZDB-260-MPD |q ZDB-260-MPD 2021 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182981089165312 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Hoepman, Jaap-Henk ca. 20. Jh |
author_GND | (DE-588)1246563746 |
author_facet | Hoepman, Jaap-Henk ca. 20. Jh |
author_role | aut |
author_sort | Hoepman, Jaap-Henk ca. 20. Jh |
author_variant | j h h jhh |
building | Verbundindex |
bvnumber | BV047612624 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
collection | ZDB-260-MPD ZDB-37-IEM |
ctrlnum | (OCoLC)1286860437 (DE-599)BVBBV047612624 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.7551/mitpress/12587.001.0001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02273nmm a2200553 c 4500</leader><controlfield tag="001">BV047612624</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221209 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211126s2021 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780262365512</subfield><subfield code="9">978-0-262-36551-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.7551/mitpress/12587.001.0001</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1286860437</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047612624</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-B170</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hoepman, Jaap-Henk</subfield><subfield code="d">ca. 20. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1246563746</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy is hard and seven other myths</subfield><subfield code="b">achieving privacy through careful design</subfield><subfield code="c">Jaap-Henk Hoepman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Massachusetts ; London, England</subfield><subfield code="b">The MIT Press</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 261 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book debunks 10 myths about how hard it really is to design privacy-friendly systems"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Privacy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Computer Science</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Internet / Online Safety & Privacy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Data Science / Data Modeling & Design</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-262-04582-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.7551/mitpress/12587.001.0001</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-260-MPD</subfield><subfield code="a">ZDB-37-IEM</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032997434</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/servlet/opac?bknumber=9570180</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-37-IEM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.7551/mitpress/12587.001.0001</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-260-MPD</subfield><subfield code="q">ZDB-260-MPD 2021</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047612624 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:40:17Z |
indexdate | 2024-07-10T09:16:11Z |
institution | BVB |
isbn | 9780262365512 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032997434 |
oclc_num | 1286860437 |
open_access_boolean | |
owner | DE-188 DE-B170 DE-573 |
owner_facet | DE-188 DE-B170 DE-573 |
physical | 1 Online-Ressource (xii, 261 Seiten) |
psigel | ZDB-260-MPD ZDB-37-IEM ZDB-260-MPD ZDB-260-MPD 2021 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | The MIT Press |
record_format | marc |
spelling | Hoepman, Jaap-Henk ca. 20. Jh. Verfasser (DE-588)1246563746 aut Privacy is hard and seven other myths achieving privacy through careful design Jaap-Henk Hoepman Cambridge, Massachusetts ; London, England The MIT Press [2021] © 2021 1 Online-Ressource (xii, 261 Seiten) txt rdacontent c rdamedia cr rdacarrier "This book debunks 10 myths about how hard it really is to design privacy-friendly systems"-- Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Computer security Data protection Privacy COMPUTERS / Computer Science COMPUTERS / Internet / Online Safety & Privacy COMPUTERS / Data Science / Data Modeling & Design Privatsphäre (DE-588)4123980-5 s Datenschutz (DE-588)4011134-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Druck-Ausgabe 978-0-262-04582-7 https://doi.org/10.7551/mitpress/12587.001.0001 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Hoepman, Jaap-Henk ca. 20. Jh Privacy is hard and seven other myths achieving privacy through careful design Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011134-9 (DE-588)4123980-5 |
title | Privacy is hard and seven other myths achieving privacy through careful design |
title_auth | Privacy is hard and seven other myths achieving privacy through careful design |
title_exact_search | Privacy is hard and seven other myths achieving privacy through careful design |
title_exact_search_txtP | Privacy is hard and seven other myths achieving privacy through careful design |
title_full | Privacy is hard and seven other myths achieving privacy through careful design Jaap-Henk Hoepman |
title_fullStr | Privacy is hard and seven other myths achieving privacy through careful design Jaap-Henk Hoepman |
title_full_unstemmed | Privacy is hard and seven other myths achieving privacy through careful design Jaap-Henk Hoepman |
title_short | Privacy is hard and seven other myths |
title_sort | privacy is hard and seven other myths achieving privacy through careful design |
title_sub | achieving privacy through careful design |
topic | Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Computersicherheit Datenschutz Privatsphäre |
url | https://doi.org/10.7551/mitpress/12587.001.0001 |
work_keys_str_mv | AT hoepmanjaaphenk privacyishardandsevenothermythsachievingprivacythroughcarefuldesign |