Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    edocfu_9959441229202883
    Format: 1 online resource (xxiii, 374 pages) : , illustrations
    ISBN: 1-000-21864-3 , 0-429-09379-9 , 1-4398-3013-4
    Series Statement: Gale eBooks
    Uniform Title: Unauthorized Access (Online)
    Content: Annotation
    Note: "A Chapman & Hall book." , Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs , Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover , English
    Additional Edition: ISBN 1-138-43692-5
    Additional Edition: ISBN 1-4398-3014-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages