|
|
|
|
LEADER |
04103nas a2200769 a 4500 |
001 |
30034 |
003 |
IGIG |
005 |
20101012012921.0 |
006 |
m d |
007 |
cr|||||||||||| |
008 |
101001c20079999pauqr p s 0 0eng d |
010 |
# |
# |
|z 2006212106
|
022 |
0 |
# |
|a 1930-1669
|l 1930-1650
|2 1
|
024 |
7 |
# |
|a 10.4018/ijisp
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00543832
|
035 |
# |
# |
|a (OCoLC)807273804
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a QA76.9.A25
|b I55624 2007e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
222 |
# |
0 |
|a International journal of information security and privacy
|
245 |
0 |
0 |
|a International journal of information security and privacy
|h [electronic resource].
|
246 |
1 |
3 |
|a Information security and privacy
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA),
|c 2007-
|
300 |
# |
# |
|a electronic texts ( v.) :
|b digital files.
|
310 |
# |
# |
|a Quarterly
|
362 |
1 |
# |
|a Began with Vol. 1, no. 1 (2007).
|
500 |
# |
# |
|a "An official publication of the Information Resources Management Association."
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
# |
# |
|a As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on: Vol. 1, no. 1 (2007); title from title screen (IGI Global, viewed Oct. 1, 2010).
|
588 |
# |
# |
|a Latest issue consulted: Vol. 4, no. 2 (2010).
|
650 |
# |
0 |
|a Computer security
|v Periodicals.
|
650 |
# |
0 |
|a Data protection
|v Periodicals.
|
653 |
# |
# |
|a Agents and mobile communication systems
|
653 |
# |
# |
|a Authentication and authorization of users, systems, and applications
|
653 |
# |
# |
|a Case studies
|
653 |
# |
# |
|a Civil rights and liberties
|
653 |
# |
# |
|a Computer worms and viruses
|
653 |
# |
# |
|a Consumer and business practices and trends
|
653 |
# |
# |
|a Cryptographic techniques and protocols
|
653 |
# |
# |
|a Database issues in privacy protection
|
653 |
# |
# |
|a Distributed, forward, and proactive policies and procedures
|
653 |
# |
# |
|a Distributed marketplaces, auctions, and gaming
|
653 |
# |
# |
|a Economic impact analysis
|
653 |
# |
# |
|a Electronic commerce, banking, and payment protocols
|
653 |
# |
# |
|a Encryption, authentication, and access control
|
653 |
# |
# |
|a Enhancements for Storage Area Networks
|
653 |
# |
# |
|a E-services, e-voting, and e-government
|
653 |
# |
# |
|a File and file system security and privacy
|
653 |
# |
# |
|a Firewall technologies, policies, and trends
|
653 |
# |
# |
|a Hacking and corruptions
|
653 |
# |
# |
|a Identity and privacy confidentiality
|
653 |
# |
# |
|a Legal, regulatory, and compliance issues
|
653 |
# |
# |
|a Malicious codes and attacks against networks
|
653 |
# |
# |
|a Multiparty communications, co-operations, and computations
|
653 |
# |
# |
|a Networks and security protocols
|
653 |
# |
# |
|a Peer-to-Peer computing
|
653 |
# |
# |
|a Security and privacy techniques, management, and protocols
|
653 |
# |
# |
|a Trends and new developments
|
653 |
# |
# |
|a World Wide Web authentication and authorization
|
710 |
2 |
# |
|a IGI Global.
|
710 |
2 |
# |
|a Information Resources Management Association.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2006212106
|x 1930-1650
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijisp
|z View fulltext via EzAccess
|