語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Analyzing security, trust, and crime...
~
Nemati, Hamid R., (1958-)
FindBook
Google Book
Amazon
博客來
Analyzing security, trust, and crime in the digital world /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Analyzing security, trust, and crime in the digital world // Hamid R. Nemati, editor.
其他作者:
Nemati, Hamid R.,
面頁冊數:
PDFs (281 pages).
內容註:
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
標題:
Information technology - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
ISBN:
9781466648579 (ebook)
Analyzing security, trust, and crime in the digital world /
Analyzing security, trust, and crime in the digital world /
Hamid R. Nemati, editor. - PDFs (281 pages).
Includes bibliographical references.
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
Restricted to subscribers or individual electronic text purchasers.
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466648579 (ebook)
Standard No.: 10.4018/978-1-4666-4856-2doi
LCCN: 2013042581Subjects--Topical Terms:
590547
Information technology
--Security measures.Subjects--Index Terms:
Cyber crime
LC Class. No.: HF5548.37 / .A527 2014e
Dewey Class. No.: 005.8
Analyzing security, trust, and crime in the digital world /
LDR
:03073nmm a2200457 i 4500
001
2000083
003
IGIG
005
20140330204503.0
008
151126s2014 pau fob 000 0 eng d
010
$a
2013042581
020
$a
9781466648579 (ebook)
020
$a
9781466648562
$q
print
020
$a
9781466648586
$q
print & perpetual access
024
7
$a
10.4018/978-1-4666-4856-2
$2
doi
035
$a
(CaBNVSL)gtp00558780
035
$a
00000216
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
HF5548.37
$b
.A527 2014e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Analyzing security, trust, and crime in the digital world /
$c
Hamid R. Nemati, editor.
264
1
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :
$b
IGI Global,
$c
[2014]
300
$a
PDFs (281 pages).
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
504
$a
Includes bibliographical references.
505
0
$a
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Information technology
$x
Security measures.
$3
590547
650
0
$a
Computer security.
$3
540555
650
0
$a
Data protection.
$3
590548
650
0
$a
Computer crimes.
$3
583792
653
$a
Cyber crime
653
$a
Data security
653
$a
Information privacy
653
$a
Intrusion detection systems
653
$a
Network security
653
$a
Security technologies
653
$a
Trust management
653
$a
User authentication
700
1
$a
Nemati, Hamid R.,
$d
1958-
$3
876613
710
2
$a
IGI Global,
$e
publisher.
$3
2142982
776
0
$c
(Original)
$w
(DLC)2013042581
776
0 8
$i
Print version:
$z
1466648562
$z
9781466648562
$w
(DLC) 2013042581
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4856-2
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9269445
電子資源
11.線上閱覽_V
電子書
EB HF5548.37 .A527 2014e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入