UID:
almahu_9947421343602882
Umfang:
PDFs (281 pages).
ISBN:
9781466648579
Inhalt:
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
Anmerkung:
A general framework of algorithm-based fault tolerance technique for computing systems / Hodjatollah Hamidi Methods on determining the investment in IT security / Amanda Eisenga, Walter Rodriguez, Travis L. Jones Critical path stability region: a single-time estimate approach / Hossein Arsham, Veena Adlakha Authenticity in online knowledge sharing: experiences from networks of competence meetings / Inge Hermanrud Information privacy concerns and workplace surveillance: a case of differing perspectives / Regina Connolly Wearable computing: security challenges, BYOD, privacy, and legal aspects / John Lindström, Claas Hanken Control mechanism of identity theft and its integrative impact on consumers' purchase intention in e-commerce / Mahmud A. Shareef, Vinod Kumar, Uma Kumar The influence of trust in the UTAUT model / Eduardo Esteva-Armida, Alberto Rubio-Sanchez Technology-related risks in virtual and traditional information systems projects / April H. Reed A likelihood ratio-based forensic text comparison in SMS messages: a fused system with lexical features and N-grams / Shunichi Ishihara.
,
Also available in print.
,
Mode of access: World Wide Web.
Weitere Ausg.:
Print version: ISBN 1466648562
Weitere Ausg.:
ISBN 9781466648562
Sprache:
Englisch
DOI:
10.4018/978-1-4666-4856-2
URL:
Chapter PDFs via platform: