Security in virtual worlds, 3D webs, and immersive environments models for development, interaction and management

"This publication discusses the uses and potential of virtual technologies and examines secure policy formation and practices that can be applied specifically to each"--Provided by publisher

Bibliographic Details
Other Authors: Rea, Alan
Format: Book
Published: Hershey, PA Information Science Reference c2011
Subjects:
Online Access:View fulltext via EzAccess
LEADER 01300cam a2200301 a 4500
001 25738
003 DLC
005 20110617162011.0
008 101025s2011 paua b 001 0 eng
010 # # |a 2010045520 
020 # # |a 9781615208913 (hardcover) 
020 # # |a 9781615208920 (ebook) 
040 # # |a DLC  |c DLC  |d DLC 
042 # # |a pcc 
050 # # |a TK5105.59  |b .S442 2011 
082 # # |a 005.8  |2 22 
245 # # |a Security in virtual worlds, 3D webs, and immersive environments  |b models for development, interaction and management  |c Alan Rea. 
260 # # |a Hershey, PA  |b Information Science Reference  |c c2011 
300 # # |a xix, 336 p.  |b ill.  |c 29 cm 
500 # # |a "Premier reference source"--Cover 
504 # # |a Includes bibliographical references and index 
520 # # |a "This publication discusses the uses and potential of virtual technologies and examines secure policy formation and practices that can be applied specifically to each"--Provided by publisher 
650 # # |a Computer networks  |x Security measures 
650 # # |a Web sites  |x Security measures 
650 # # |a World Wide Web  |x Security measures 
700 # # |a Rea, Alan 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-891-3  |z View fulltext via EzAccess