Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Hershey PA : Information Science Reference
    UID:
    b3kat_BV044447551
    Format: 1 Online-Ressource (xiv, 324 Seiten)
    ISBN: 9781466600270 , 9781466600287
    Series Statement: Premier reference source
    Content: "This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems" - Provided by publisher
    Note: Includes bibliographical references , 1. Provable security for outsourcing database operations / Sergei Evdokimov, Matthias Fischmann and Oliver G unther -- 2. A host-based intrusion detection system using architectural features to improve sophisticated denial-of-service attack detections / Ran Tao ... [et al.] -- 3. A keystroke biometric system for long-text input / Charles C. Tappert ... [et al.] -- 4. A six-view perspective framework for system security: issues, risks, and requirements / Surya B. Yadav -- 5. Are online privacy policies readable? / M. Sumeeth, R.I. Singh and J. Miller -- 6. Protecting user privacy better with query l-diversity / Fuyu Liu and Kien A. Hua -- 7. Globalization and data privacy: an exploratory study / Robert L. Totterdale -- 8. Security issues for cloud computing / Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham -- 9. Global information security factors / Garry White and Ju Long -- 10. The integrated privacy model: building a privacy model in the business processes of the enterprise / Munir Majdalawieh -- 11. Policy enforcement system for inter-organizational data sharing / Mamoun Awad, Latifur Khan and Bhavani Thuraisingham -- 12. Goals and practices in maintaining information systems security / Zippy Erlich and Moshe Zviran -- 13. Factors influencing college students' use of computer security / Norman Pendegraft and Robert W. Stone -- 14. A game theoretic approach to optimize identity exposure in pervasive computing environments / Feng W. Zhu, Sandra Carpenter, Wei Zhu and Matt Mutka -- 15. Hiding message in map along pre-Hamiltonian path / Sunil Kumar Muttoo and Vinay Kumar -- 16. Probabilistic inference channel detection and restriction applied to patients' privacy assurance / Bandar Alhaqbani and Colin Fidge
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4666-0026-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-4666-0026-8
    Language: English
    Keywords: Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages