رکورد قبلیرکورد بعدی

" Information security and ethics : "


Document Type : BL
Record Number : 1032752
Doc. No : b787122
Title & Author : Information security and ethics : : concepts, methodologies, tools and applications /\ Hamid Nemati, [editor].
Publication Statement : Hershey, Pa. :: IGI Global,, ©2008.
Series Statement : Contemporary research in information science and technology
Page. NO : 1 online resource (electronic texts (lxxvi, 4037 pages) :: illustrations).
ISBN : 1599049384
: : 9781599049380
: 1599049376
: 9781599049373
Notes : "Premier reference source"--Cover.
Bibliographies/Indexes : Includes bibliographical references.
Contents : Title Page; List of Contributors; Contentsby Volume; Preface; Introductory Chapter:Information Security and Ethics; About the Editor; Section 1:Fundamental Conceptsand Theories; Chapter 1.1:E-Government andDenial of Service Attacks; Chapter 1.2:Policy Frameworks forSecure Electronic Business; Chapter 1.3:Audio Watermarking:Properties, Techniques, and Evaluation; Chapter 1.4:Software Piracy:Possible Causes and Cures; Chapter 1.5:Administering theSemantic Web:Confidentiality, Privacy, andTrust Management.
: Chapter 1.14:Integrating Security andSoftware Engineering:An IntroductionChapter 1.15:Ethics of Data Mining; Chapter 1.16:Privacy-Dangersand Protections; Chapter 1.17:Ethics of New Technologies; Chapter 1.18:Ethics and HCI; Chapter 1.19:The Central Problem inCyber Ethics and How StoriesCan Be Used to Address It; Chapter 1.20:Digital Watermarking:An Introduction; Chapter 1.21:Signals of Trustworthinessin E-Commerce:Consumer Understanding ofThird-Party Assurance Seals; Chapter 1.22:Moral Foundations ofData Mining; Chapter 1.23:Privacy and Security inE-Learning.
: Chapter 1.24:Telework Information SecurityChapter 1.25:Conducting EthicalResearch Online:Respect for Individuals, Identities, and theOwnership of Words; Chapter 1.26:A Unified Information SecurityManagement Plan; Chapter 1.27:Information SecurityManagement; Chapter 1.28:The Challenge of Privacy andSecurity and theImplementation of HealthKnowledge ManagementSystems; Chapter 1.29:Would Be Pirates:Webcasters, Intellectual Property, and Ethics; Chapter 1.30:Check-Off PasswordSystem (COPS):An Advancement in User AuthenticationMethods and Information Security.
: Chapter 1.31:The Game of Defenseand SecurityChapter 1.32:Data Hiding inDocument Images; Chapter 1.33:Ethics of Digital Government; Chapter 1.34:Digital Morality and Ethics; Chapter 1.35:Net Diplomacy; Chapter 1.36:Ethical Issues inInformation Technology; Chapter 1.37:Protecting One's Privacy:Insight into the Views and Nature of theEarly Adopters of Privacy Services; Chapter 1.38:The Desire for Privacy:Insights into the Views and Nature of theEarly Adopters of Privacy Services; Chapter 1.39:Security in Service-OrientedArchitecture:Issues, Standards, and Implementations.
: Chapter 1.6:Human and Social Perspectivesin Information Technology:An Examination of Fraud on the InternetChapter 1.7: Codes of Ethics in Virtual Communities; Chapter 1.8:Digital Audio Watermarking; Chapter 1.9: Secure Authentication Process for High Sensitive Data E-Services: A Roadmap; Chapter 1.10: Evolution of Information- Hiding Technology; Chapter 1.11:Description of PoliciesEnriched by Semantics forSecurity Management; Chapter 1.12:Privacy and Securityin E-Learning1; Chapter 1.13:Ethical Challenges forInformation SystemsProfessionals.
Abstract : Information Security and Ethics: Concepts, Methodologies, Tools, and Applications serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges.
Subject : Computer security.
Subject : Information technology-- Moral and ethical aspects.
Subject : Information technology-- Security measures.
Subject : Computer security.
Subject : Information technology-- Moral and ethical aspects.
Subject : Information technology-- Security measures.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬‭I54152 2008e‬
Added Entry : Nemati, Hamid R.,1958-
Added Entry : IGI Global.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟