Back to Search results for [ subject:"Cyber crime" ]

Analyzing security, trust, and crime...
Nemati, Hamid R. (1958-)

 

  • Analyzing security, trust, and crime in the digital world
  • Record Type: Language materials, printed : monographic
    Secondary Intellectual Responsibility: NematiHamid R., 1958-
    Secondary Intellectual Responsibility: IGI Global
    Description: PDFs (281 pages).
    Subject: Computer crimes. -
    Subject: Data protection. -
    Subject: Computer security. -
    Subject: Information technology - Security measures. -
    Subject: Cyber crime
    Subject: Data security
    Subject: Information privacy
    Subject: Intrusion detection systems
    Subject: Network security
    Subject: Security technologies
    Subject: Trust management
    Subject: User authentication
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
    Notes: Content Type: text
    Summary: "This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
    ISBN: 9781466648579
    Content Note: A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login