Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Milton :Taylor & Francis Group,
    UID:
    almahu_9949516189802882
    Format: 1 online resource (399 pages)
    ISBN: 9781000218640
    Content: Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues.
    Additional Edition: Print version: Warner, Richard Unauthorized Access Milton : Taylor & Francis Group,c2013 ISBN 9781138436923
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1780091591
    Format: 1 online resource (xxiii, 354 pages)
    ISBN: 9781439830147 , 1439830142 , 1439830134 , 9781439830130 , 9780429093791 , 0429093799 , 9781466548039 , 1466548037 , 9781138436923 , 1138436925 , 9781000218640 , 1000218643 , 9781299875692 , 1299875696
    Content: Ch. 1. Introduction -- ch. 2. An explanation of the internet, computers, and data mining -- ch. 3. Norms and markets -- ch. 4. Informational privacy : the general theory -- ch. 5. Informational privacy : norms and value optimality -- ch. 6. Software vulnerabilities and the low-priced software norm -- ch. 7. Software vulnerabilities : creating best practices -- ch. 8. Computers and networks : attack and defense -- ch. 9. Malware, norms, and ISPs -- ch. 10. Malware : creating a best practices norm -- ch. 11. Tracking, contracting, and behavioral advertising -- ch. 12. From one-sided chicken to value optimal norms.
    Content: Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.
    Note: Includes bibliographical references
    Additional Edition: ISBN 9781439830130
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781439830130
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edocfu_9959441229202883
    Format: 1 online resource (xxiii, 374 pages) : , illustrations
    ISBN: 1-000-21864-3 , 0-429-09379-9 , 1-4398-3013-4
    Series Statement: Gale eBooks
    Uniform Title: Unauthorized Access (Online)
    Content: Annotation
    Note: "A Chapman & Hall book." , Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs , Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover , English
    Additional Edition: ISBN 1-138-43692-5
    Additional Edition: ISBN 1-4398-3014-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948426200702882
    Format: 1 online resource (xxiii, 374 pages) : , illustrations
    ISBN: 1-000-21864-3 , 0-429-09379-9 , 1-4398-3013-4
    Series Statement: Gale eBooks
    Uniform Title: Unauthorized Access (Online)
    Content: Annotation
    Note: "A Chapman & Hall book." , Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs , Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover , English
    Additional Edition: ISBN 1-138-43692-5
    Additional Edition: ISBN 1-4398-3014-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    edoccha_9959441229202883
    Format: 1 online resource (xxiii, 374 pages) : , illustrations
    ISBN: 1-000-21864-3 , 0-429-09379-9 , 1-4398-3013-4
    Series Statement: Gale eBooks
    Uniform Title: Unauthorized Access (Online)
    Content: Annotation
    Note: "A Chapman & Hall book." , Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs , Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover , English
    Additional Edition: ISBN 1-138-43692-5
    Additional Edition: ISBN 1-4398-3014-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9781000210644?
Did you mean 9781000211641?
Did you mean 9781000078640?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages