|
|
|
|
LEADER |
04294nam a2200577 a 4500 |
001 |
19492 |
003 |
IGIG |
005 |
20120130005716.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
120123s2012 pau fsb 000 0 eng d |
010 |
# |
# |
|z 2011049414
|
020 |
# |
# |
|a 9781466600270 (ebook)
|
020 |
# |
# |
|z 9781466600263 (hbk.)
|
020 |
# |
# |
|z 9781466600287 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-4666-0026-3
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00550662
|
035 |
# |
# |
|a (OCoLC)807848376
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a QA76.9.A25
|b O685 2012e
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Optimizing information security and advancing privacy assurance
|b new technologies /
|c Hamid R. Nemati, editor.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2012.
|
300 |
# |
# |
|a electronic texts (294 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver Günther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed January 23, 2012).
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Information technology
|x Security measures.
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Data protection.
|
653 |
# |
# |
|a Biometrics
|
653 |
# |
# |
|a Cloud computing and security
|
653 |
# |
# |
|a Global information security
|
653 |
# |
# |
|a Information security perspectives
|
653 |
# |
# |
|a Inter-organizational data sharing
|
653 |
# |
# |
|a Intrusion detection systems
|
653 |
# |
# |
|a Online privacy policies
|
653 |
# |
# |
|a Outsourcing and security
|
653 |
# |
# |
|a Privacy in enterprises
|
653 |
# |
# |
|a User privacy
|
700 |
1 |
# |
|a Nemati, Hamid R.,
|d 1958-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2011049414
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2011049414
|z 9781466600263
|z 1466600268
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0026-3
|3 Chapter PDFs via platform:
|