語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Analyzing security, trust, and crime...
~
Nemati, Hamid R. (1958-)
Analyzing security, trust, and crime in the digital world
紀錄類型:
書目-語言資料,印刷品 : 單行本
其他作者:
NematiHamid R., 1958-
其他團體作者:
IGI Global
面頁冊數:
PDFs (281 pages).
標題:
Computer crimes. -
標題:
Data protection. -
標題:
Computer security. -
標題:
Information technology - Security measures. -
標題:
Cyber crime
標題:
Data security
標題:
Information privacy
標題:
Intrusion detection systems
標題:
Network security
標題:
Security technologies
標題:
Trust management
標題:
User authentication
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
附註:
Content Type: text
摘要註:
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
ISBN:
9781466648579
內容註:
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
Analyzing security, trust, and crime in the digital world
Analyzing security, trust, and crime in the digital world
/ Hamid R. Nemati, editor. - PDFs (281 pages)..
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara..
Content Type: textMedia type: electronicCarrier type: online resourceRestricted to subscribers or individual electronic text purchasers..
Includes bibliographical references..
ISBN 9781466648579ISBN 9781466648562ISBN 9781466648586
Computer crimes.Data protection.Computer security.Information technology -- Security measures.
Cyber crimeData securityInformation privacyIntrusion detection systemsNetwork securitySecurity technologiesTrust managementUser authentication
Nemati, Hamid R.
Analyzing security, trust, and crime in the digital world
LDR
:02953nam a2200457 450
001
288647
005
20140330204503.0
009
a(CaBNVSL)gtp00558780
009
00000216
010
1
$a
9781466648579
$b
ebook
010
1
$a
9781466648562
010
1
$a
9781466648586
012
0
$a
10.4018/978-1-4666-4856-2
020
$b
2013042581
100
$a
20151127d2014 y0engy50 b
102
$a
us
105
$a
y a 000yy
200
1
$a
Analyzing security, trust, and crime in the digital world
$f
Hamid R. Nemati, editor.
215
1
$a
PDFs (281 pages).
300
$a
Content Type: text
300
$a
Media type: electronic
300
$a
Carrier type: online resource
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-4856-2
310
$a
Also available in print.
320
$a
Includes bibliographical references.
327
1
$a
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
330
$a
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2013042581
452
1
$1
300
$a
Print version:
$1
001(DLC) 2013042581
$1
0101
$a
1466648562; 9781466648562
606
$a
Computer crimes.
$2
lc
$3
385066
606
$a
Data protection.
$2
lc
$3
385065
606
$a
Computer security.
$3
63991
606
$a
Information technology
$x
Security measures.
$2
lc
$3
385051
610
1
$a
Cyber crime
610
1
$a
Data security
610
1
$a
Information privacy
610
1
$a
Intrusion detection systems
610
1
$a
Network security
610
1
$a
Security technologies
610
1
$a
Trust management
610
1
$a
User authentication
676
$a
005.8
$v
23
680
$a
HF5548.37
$b
.A527 2014e
702
1
$a
Nemati
$b
Hamid R.
$f
1958-
$4
editor.
$3
385064
712
0 2
$a
IGI Global
$4
publisher.
$3
384552
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入