|
|
|
|
LEADER |
04696nam a2200625 a 4500 |
001 |
29911 |
003 |
IGIG |
005 |
20100824171214.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
100726s2009 paua fsb 000 0 eng d |
010 |
# |
# |
|z 2008051169
|
020 |
# |
# |
|a 9781605662114 (ebook)
|
020 |
# |
# |
|a 1605662119 (ebook)
|
020 |
# |
# |
|z 1605662100; (hardcover)
|
020 |
# |
# |
|z 9781605662107 (hardcover)
|
020 |
# |
# |
|z 9781616924997 (pbk.)
|
024 |
7 |
# |
|a 10.4018/978-1-60566-210-7
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00543132
|
035 |
# |
# |
|a (OCoLC)707611846
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HF5548.37
|b .T43 2009e
|
082 |
0 |
4 |
|a 658.4/78
|2 22
|
245 |
0 |
0 |
|a Techniques and applications for advanced information privacy and security
|b emerging organizational, ethical, and human issues /
|c [edited by] Hamid R. Nemati.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2009.
|
300 |
# |
# |
|a electronic texts (xxxiv, 378 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. A rule-based and game-theoretic approach to on-line credit card fraud detection / Vishal Vatsa, Shamik Sural, A.K. Majumdar -- 2. Email worm detection using data mining / Mohammad Masud, Latifur Khan, Bhavani Thuraisingham -- 3. Information systems security / Hamid Jahankhani, Shantha Fernando, Mathews Nkhoma -- 4. Rootkits and what we know / Kirk Arnett ... [et al.] -- 5. Privacy-preserving data mining and the need for confluence of research and practice / Lixin Fu, Hamid Nemati, Fereidoon Sadri -- 6. A dimensionality reduction-based transformation to support business collaboration / Stanley Oliveira, Osmar Zaiane -- 7. Privacy-preserving transactions protocol using mobile agents with mutual authentication / Song Han ... [et al.] -- 8. Dynamic control mechanisms for user privacy enhancement / Amr Ali Eldin -- 9. A projection of the future effects of quantum computation on information privacy / Geoff Skinner, Elizabeth Chang -- 10. On the design of an authentication system based on keystroke dynamics using a predefined input text / Dieter Bartmann, Idir Bakdi, Michael Achatz -- 11. Defeating active phishing attacks for Web-based transactions / Xin Luo, Teik Guan Tan -- 12. A content-based watermarking scheme for image authentication using discrete wavelet transform inter-coefficient relations / Latha Parameswaran, K Anbumani -- 13. Privacy and security in the age of electronic customer relationship management / Nicholas Romano, Jerry Fjermestad -- 14. The impact of privacy Risk Harm (RH) and Risk Likelihood (RL) on IT acceptance / Joseph Cazier, E. Wilson, B. Medlin -- 15. Ignorance is bliss / Thomas Van Dyke -- 16. Trustworthy Web services / Stephen Yang ... [et al.] -- 17. Administering the Semantic Web / Bhavani Thuraisingham, Natasha Tsybulnik, Ashraful Alam -- 18. An ontology of information security / Almut Herzog, Nahid Shahmehri, Claudiu Duma -- 19. Information security effectiveness / Kenneth Knapp ... [et al.] -- 20. A simulation model of IS security / Norman Pendegraft, Mark Rounds.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book provides a thorough understanding of issues and concerns in information technology security"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on July 27, 2010).
|
650 |
# |
0 |
|a Electronic commerce
|x Security measures.
|
650 |
# |
0 |
|a Information technology
|x Security measures.
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Data protection.
|
653 |
# |
# |
|a Authentication system design
|
653 |
# |
# |
|a Dynamic control mechanisms
|
653 |
# |
# |
|a Effects of quantum computation on information privacy
|
653 |
# |
# |
|a Evaluating information security and privacy
|
653 |
# |
# |
|a Image authentication
|
653 |
# |
# |
|a Information security and privacy
|
653 |
# |
# |
|a Information security effectiveness
|
653 |
# |
# |
|a Information systems security
|
653 |
# |
# |
|a Privacy preservation and techniques
|
653 |
# |
# |
|a Privacy-preserving clustering
|
653 |
# |
# |
|a Privacy-preserving transactions protocol
|
653 |
# |
# |
|a Security and privacy management
|
653 |
# |
# |
|a Web security and privacy issues and technologies
|
700 |
1 |
# |
|a Nemati, Hamid R.,
|d 1958-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2008051169
|z 9781605662107
|z 1605662100
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-210-7
|z View fulltext via EzAccess
|