Pervasive information security and privacy developments : trends and advancements /

"This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological ar...

Full description

Bibliographic Details
Other Authors: Nemati, Hamid R., 1958-
Format: Book
Published: Hershey, Pa. : Information Science Reference, c2011.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 01517nam a22002891a 4500
001 25641
003 Uk
005 20111003143955.0
008 100723s2011 paua b 001 0 eng
010 # # |a 2010030739 
020 # # |a 9781616920005 (hbk.) 
020 # # |a 9781616920012 (ebk.) 
040 # # |a DLC  |c DLC  |d DLC  |d Uk 
042 # # |a ukblcatcopy 
050 # # |a QA76.9.A25  |b P442 2011 
082 # # |a 005.8  |2 22 
245 # # |a Pervasive information security and privacy developments :  |b trends and advancements /  |c Hamid Nemati [editor]. 
260 # # |a Hershey, Pa. :  |b Information Science Reference,  |c c2011. 
300 # # |a xxxvii, 428 p. :  |b ill. ;  |c 29 cm. 
504 # # |a Includes bibliographical references (p. 388-413) and index. 
520 # # |a "This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives"--Provided by publisher. 
650 # # |a Information technology  |x Security measures. 
650 # # |a Data protection. 
650 # # |a Computer security. 
650 # # |a Privacy, Right of. 
700 # # |a Nemati, Hamid R.,  |d 1958- 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-000-5  |z View fulltext via EzAccess