|
|
|
|
LEADER |
01300cam a2200301 a 4500 |
001 |
25738 |
003 |
DLC |
005 |
20110617162011.0 |
008 |
101025s2011 paua b 001 0 eng |
010 |
# |
# |
|a 2010045520
|
020 |
# |
# |
|a 9781615208913 (hardcover)
|
020 |
# |
# |
|a 9781615208920 (ebook)
|
040 |
# |
# |
|a DLC
|c DLC
|d DLC
|
042 |
# |
# |
|a pcc
|
050 |
# |
# |
|a TK5105.59
|b .S442 2011
|
082 |
# |
# |
|a 005.8
|2 22
|
245 |
# |
# |
|a Security in virtual worlds, 3D webs, and immersive environments
|b models for development, interaction and management
|c Alan Rea.
|
260 |
# |
# |
|a Hershey, PA
|b Information Science Reference
|c c2011
|
300 |
# |
# |
|a xix, 336 p.
|b ill.
|c 29 cm
|
500 |
# |
# |
|a "Premier reference source"--Cover
|
504 |
# |
# |
|a Includes bibliographical references and index
|
520 |
# |
# |
|a "This publication discusses the uses and potential of virtual technologies and examines secure policy formation and practices that can be applied specifically to each"--Provided by publisher
|
650 |
# |
# |
|a Computer networks
|x Security measures
|
650 |
# |
# |
|a Web sites
|x Security measures
|
650 |
# |
# |
|a World Wide Web
|x Security measures
|
700 |
# |
# |
|a Rea, Alan
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-891-3
|z View fulltext via EzAccess
|