Unauthorized access: the crisis in online privacy and security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Schlagworte: | |
Online-Zugang: | kostenfrei |
Beschreibung: | 1 Online-Ressource (xxiii, 354 Seiten) |
ISBN: | 0429093799 1000218643 1138436925 1299875696 1439830134 1439830142 1466548037 9780429093791 9781138436923 9781439830130 9781439830147 9781466548039 9781000218640 9781299875692 |
Zugangseinschränkungen: | Open Access |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048283078 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220610s2014 |||| o||u| ||||||eng d | ||
020 | |a 0429093799 |9 0429093799 | ||
020 | |a 1000218643 |9 1000218643 | ||
020 | |a 1138436925 |9 1138436925 | ||
020 | |a 1299875696 |9 1299875696 | ||
020 | |a 1439830134 |9 1439830134 | ||
020 | |a 1439830142 |q (ebook) |9 1439830142 | ||
020 | |a 1466548037 |9 1466548037 | ||
020 | |a 9780429093791 |q (ebook : PDF) |9 9780429093791 | ||
020 | |a 9781138436923 |q (hardback) |9 9781138436923 | ||
020 | |a 9781439830130 |9 9781439830130 | ||
020 | |a 9781439830147 |q (ebook) |9 9781439830147 | ||
020 | |a 9781466548039 |q (ebook) |9 9781466548039 | ||
020 | |a 9781000218640 |q (online) |9 9781000218640 | ||
020 | |a 9781299875692 |q (online) |9 9781299875692 | ||
020 | |z 9781439830130 |q (alk. paper) |9 9781439830130 | ||
024 | 7 | |a 10.1201/b15148 |2 doi | |
035 | |a (OCoLC)857078800 | ||
035 | |a (DE-599)BVBBV048283078 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
100 | 1 | |a Sloan, Robert H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Unauthorized access |b the crisis in online privacy and security |c Robert H. Sloan, Richard Warner |
264 | 0 | |a Boca Raton, Fla. |b CRC Press |c 2014 | |
300 | |a 1 Online-Ressource (xxiii, 354 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Ch. 1. Introduction -- ch. 2. An explanation of the internet, computers, and data mining -- ch. 3. Norms and markets -- ch. 4. Informational privacy : the general theory -- ch. 5. Informational privacy : norms and value optimality -- ch. 6. Software vulnerabilities and the low-priced software norm -- ch. 7. Software vulnerabilities : creating best practices -- ch. 8. Computers and networks : attack and defense -- ch. 9. Malware, norms, and ISPs -- ch. 10. Malware : creating a best practices norm -- ch. 11. Tracking, contracting, and behavioral advertising -- ch. 12. From one-sided chicken to value optimal norms | |
506 | 0 | |a Open Access |5 EbpS | |
650 | 7 | |a Internet |2 Aspect moral | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 7 | |a Internet |2 Moral and ethical aspects | |
650 | 7 | |a POLITICAL SCIENCE |2 Political Freedom & Security | |
650 | 7 | |a POLITICAL SCIENCE |2 Political Freedom & Security | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Internet |x Moral and ethical aspects | |
650 | 4 | |a Privacy, Right of | |
653 | 6 | |a Electronic books | |
653 | 6 | |a Electronic books | |
700 | 1 | |a Warner, Richard |d 1946- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Sloan, Robert H. |t Unauthorized access |d Boca Raton, Fla. : CRC Press, 2014 |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=607739 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-4-EOAC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033663244 |
Datensatz im Suchindex
_version_ | 1804184109465993216 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Sloan, Robert H. |
author_facet | Sloan, Robert H. |
author_role | aut |
author_sort | Sloan, Robert H. |
author_variant | r h s rh rhs |
building | Verbundindex |
bvnumber | BV048283078 |
collection | ZDB-4-EOAC |
contents | Ch. 1. Introduction -- ch. 2. An explanation of the internet, computers, and data mining -- ch. 3. Norms and markets -- ch. 4. Informational privacy : the general theory -- ch. 5. Informational privacy : norms and value optimality -- ch. 6. Software vulnerabilities and the low-priced software norm -- ch. 7. Software vulnerabilities : creating best practices -- ch. 8. Computers and networks : attack and defense -- ch. 9. Malware, norms, and ISPs -- ch. 10. Malware : creating a best practices norm -- ch. 11. Tracking, contracting, and behavioral advertising -- ch. 12. From one-sided chicken to value optimal norms |
ctrlnum | (OCoLC)857078800 (DE-599)BVBBV048283078 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03127nmm a2200685 c 4500</leader><controlfield tag="001">BV048283078</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220610s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0429093799</subfield><subfield code="9">0429093799</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000218643</subfield><subfield code="9">1000218643</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1138436925</subfield><subfield code="9">1138436925</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299875696</subfield><subfield code="9">1299875696</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439830134</subfield><subfield code="9">1439830134</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439830142</subfield><subfield code="q">(ebook)</subfield><subfield code="9">1439830142</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466548037</subfield><subfield code="9">1466548037</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429093791</subfield><subfield code="q">(ebook : PDF)</subfield><subfield code="9">9780429093791</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138436923</subfield><subfield code="q">(hardback)</subfield><subfield code="9">9781138436923</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439830130</subfield><subfield code="9">9781439830130</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439830147</subfield><subfield code="q">(ebook)</subfield><subfield code="9">9781439830147</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466548039</subfield><subfield code="q">(ebook)</subfield><subfield code="9">9781466548039</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000218640</subfield><subfield code="q">(online)</subfield><subfield code="9">9781000218640</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299875692</subfield><subfield code="q">(online)</subfield><subfield code="9">9781299875692</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781439830130</subfield><subfield code="q">(alk. paper)</subfield><subfield code="9">9781439830130</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b15148</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)857078800</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048283078</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sloan, Robert H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unauthorized access</subfield><subfield code="b">the crisis in online privacy and security</subfield><subfield code="c">Robert H. Sloan, Richard Warner</subfield></datafield><datafield tag="264" ind1=" " ind2="0"><subfield code="a">Boca Raton, Fla.</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 354 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Ch. 1. Introduction -- ch. 2. An explanation of the internet, computers, and data mining -- ch. 3. Norms and markets -- ch. 4. Informational privacy : the general theory -- ch. 5. Informational privacy : norms and value optimality -- ch. 6. Software vulnerabilities and the low-priced software norm -- ch. 7. Software vulnerabilities : creating best practices -- ch. 8. Computers and networks : attack and defense -- ch. 9. Malware, norms, and ISPs -- ch. 10. Malware : creating a best practices norm -- ch. 11. Tracking, contracting, and behavioral advertising -- ch. 12. From one-sided chicken to value optimal norms</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield><subfield code="5">EbpS</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">Aspect moral</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="2">Political Freedom & Security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="2">Political Freedom & Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warner, Richard</subfield><subfield code="d">1946-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Sloan, Robert H.</subfield><subfield code="t">Unauthorized access</subfield><subfield code="d">Boca Raton, Fla. : CRC Press, 2014</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=607739</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EOAC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033663244</subfield></datafield></record></collection> |
id | DE-604.BV048283078 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:00:58Z |
indexdate | 2024-07-10T09:34:07Z |
institution | BVB |
isbn | 0429093799 1000218643 1138436925 1299875696 1439830134 1439830142 1466548037 9780429093791 9781138436923 9781439830130 9781439830147 9781466548039 9781000218640 9781299875692 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033663244 |
oclc_num | 857078800 |
open_access_boolean | 1 |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (xxiii, 354 Seiten) |
psigel | ZDB-4-EOAC |
publishDateSearch | 2014 |
publishDateSort | 2014 |
record_format | marc |
spelling | Sloan, Robert H. Verfasser aut Unauthorized access the crisis in online privacy and security Robert H. Sloan, Richard Warner Boca Raton, Fla. CRC Press 2014 1 Online-Ressource (xxiii, 354 Seiten) txt rdacontent c rdamedia cr rdacarrier Ch. 1. Introduction -- ch. 2. An explanation of the internet, computers, and data mining -- ch. 3. Norms and markets -- ch. 4. Informational privacy : the general theory -- ch. 5. Informational privacy : norms and value optimality -- ch. 6. Software vulnerabilities and the low-priced software norm -- ch. 7. Software vulnerabilities : creating best practices -- ch. 8. Computers and networks : attack and defense -- ch. 9. Malware, norms, and ISPs -- ch. 10. Malware : creating a best practices norm -- ch. 11. Tracking, contracting, and behavioral advertising -- ch. 12. From one-sided chicken to value optimal norms Open Access EbpS Internet Aspect moral Protection de l'information (Informatique) Sécurité informatique Computer security Data protection Internet Moral and ethical aspects POLITICAL SCIENCE Political Freedom & Security Privacy, Right of Electronic books Warner, Richard 1946- Sonstige oth Erscheint auch als Druck-Ausgabe Sloan, Robert H. Unauthorized access Boca Raton, Fla. : CRC Press, 2014 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=607739 Verlag kostenfrei Volltext |
spellingShingle | Sloan, Robert H. Unauthorized access the crisis in online privacy and security Ch. 1. Introduction -- ch. 2. An explanation of the internet, computers, and data mining -- ch. 3. Norms and markets -- ch. 4. Informational privacy : the general theory -- ch. 5. Informational privacy : norms and value optimality -- ch. 6. Software vulnerabilities and the low-priced software norm -- ch. 7. Software vulnerabilities : creating best practices -- ch. 8. Computers and networks : attack and defense -- ch. 9. Malware, norms, and ISPs -- ch. 10. Malware : creating a best practices norm -- ch. 11. Tracking, contracting, and behavioral advertising -- ch. 12. From one-sided chicken to value optimal norms Internet Aspect moral Protection de l'information (Informatique) Sécurité informatique Computer security Data protection Internet Moral and ethical aspects POLITICAL SCIENCE Political Freedom & Security Privacy, Right of |
title | Unauthorized access the crisis in online privacy and security |
title_auth | Unauthorized access the crisis in online privacy and security |
title_exact_search | Unauthorized access the crisis in online privacy and security |
title_exact_search_txtP | Unauthorized access the crisis in online privacy and security |
title_full | Unauthorized access the crisis in online privacy and security Robert H. Sloan, Richard Warner |
title_fullStr | Unauthorized access the crisis in online privacy and security Robert H. Sloan, Richard Warner |
title_full_unstemmed | Unauthorized access the crisis in online privacy and security Robert H. Sloan, Richard Warner |
title_short | Unauthorized access |
title_sort | unauthorized access the crisis in online privacy and security |
title_sub | the crisis in online privacy and security |
topic | Internet Aspect moral Protection de l'information (Informatique) Sécurité informatique Computer security Data protection Internet Moral and ethical aspects POLITICAL SCIENCE Political Freedom & Security Privacy, Right of |
topic_facet | Internet Protection de l'information (Informatique) Sécurité informatique Computer security Data protection POLITICAL SCIENCE Privacy, Right of Internet Moral and ethical aspects |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=607739 |
work_keys_str_mv | AT sloanroberth unauthorizedaccessthecrisisinonlineprivacyandsecurity AT warnerrichard unauthorizedaccessthecrisisinonlineprivacyandsecurity |