Security in virtual worlds, 3D webs, and immersive environments models for development, interaction and management
"This publication discusses the uses and potential of virtual technologies and examines secure policy formation and practices that can be applied specifically to each"--Provided by publisher
Other Authors: | Rea, Alan |
---|---|
Format: | Book |
Published: |
Hershey, PA
Information Science Reference
c2011
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Similar Items
-
Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices /
by: Tamma, Rohit,
Published: (2020) -
Cybersecurity fundamentals a real-world perspective /
by: Thakur, Kutub.
Published: (2020) -
Internet of things for architects : architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security /
by: Lea, Perry,
Published: (2018) -
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /
by: Monnappa K A,
Published: (2018)