Language:
English
繁體中文
KMU OLIS
Login
Back
to Search results for
[ subject:"Information technology- Security measures." ]
Switch To:
Labeled
|
MARC Mode
|
ISBD
Analyzing security, trust, and crime...
~
Nemati, Hamid R. (1958-)
Analyzing security, trust, and crime in the digital world
Record Type:
Language materials, printed : monographic
Secondary Intellectual Responsibility:
NematiHamid R., 1958-
Secondary Intellectual Responsibility:
IGI Global
Description:
PDFs (281 pages).
Subject:
Computer crimes. -
Subject:
Data protection. -
Subject:
Computer security. -
Subject:
Information technology - Security measures. -
Subject:
Cyber crime
Subject:
Data security
Subject:
Information privacy
Subject:
Intrusion detection systems
Subject:
Network security
Subject:
Security technologies
Subject:
Trust management
Subject:
User authentication
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
Notes:
Content Type: text
Summary:
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
ISBN:
9781466648579
Content Note:
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
Analyzing security, trust, and crime in the digital world
Analyzing security, trust, and crime in the digital world
/ Hamid R. Nemati, editor. - PDFs (281 pages)..
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara..
Content Type: textMedia type: electronicCarrier type: online resourceRestricted to subscribers or individual electronic text purchasers..
Includes bibliographical references..
ISBN 9781466648579ISBN 9781466648562ISBN 9781466648586
Computer crimes.Data protection.Computer security.Information technology -- Security measures.
Cyber crimeData securityInformation privacyIntrusion detection systemsNetwork securitySecurity technologiesTrust managementUser authentication
Nemati, Hamid R.
Analyzing security, trust, and crime in the digital world
LDR
:02953nam a2200457 450
001
288647
005
20140330204503.0
009
a(CaBNVSL)gtp00558780
009
00000216
010
1
$a
9781466648579
$b
ebook
010
1
$a
9781466648562
010
1
$a
9781466648586
012
0
$a
10.4018/978-1-4666-4856-2
020
$b
2013042581
100
$a
20151127d2014 y0engy50 b
102
$a
us
105
$a
y a 000yy
200
1
$a
Analyzing security, trust, and crime in the digital world
$f
Hamid R. Nemati, editor.
215
1
$a
PDFs (281 pages).
300
$a
Content Type: text
300
$a
Media type: electronic
300
$a
Carrier type: online resource
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-4856-2
310
$a
Also available in print.
320
$a
Includes bibliographical references.
327
1
$a
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
330
$a
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2013042581
452
1
$1
300
$a
Print version:
$1
001(DLC) 2013042581
$1
0101
$a
1466648562; 9781466648562
606
$a
Computer crimes.
$2
lc
$3
385066
606
$a
Data protection.
$2
lc
$3
385065
606
$a
Computer security.
$3
63991
606
$a
Information technology
$x
Security measures.
$2
lc
$3
385051
610
1
$a
Cyber crime
610
1
$a
Data security
610
1
$a
Information privacy
610
1
$a
Intrusion detection systems
610
1
$a
Network security
610
1
$a
Security technologies
610
1
$a
Trust management
610
1
$a
User authentication
676
$a
005.8
$v
23
680
$a
HF5548.37
$b
.A527 2014e
702
1
$a
Nemati
$b
Hamid R.
$f
1958-
$4
editor.
$3
385064
712
0 2
$a
IGI Global
$4
publisher.
$3
384552
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login