Security and privacy assurance in advancing technologies new developments
Material type: TextPublication details: Hershey Information Science Reference 2011Description: xxxvii,456pISBN:- 9781609602000
- 005.8 22 NE-S
- HD30.2 .S437 2011
Item type | Home library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
OPJGU Sonepat- Campus Main Library | General Books | 005.8 NE-S (Browse shelf(Opens below)) | Available | 116293 |
Browsing OPJGU Sonepat- Campus shelves, Collection: General Books Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
005.8 ME-C Cybersecurity for beginners / | 005.8 ME-C Cybersecurity for beginners / | 005.8 ME-N Network security and cryptography | 005.8 NE-S Security and privacy assurance in advancing technologies new developments | 005.8 PA-Y You can hack the art of exploitation | 005.8 RA-I Information security management concepts and practice | 005.8 RI-P Pegasus : the story of the world's most dangerous spyware / |
Includes bibliographical references and index.
Re-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
There are no comments on this title.