000 02187cam a22003378a 4500
001 16547261
005 20140207020002.0
007 Hard bound
008 101119s2011 pau b 001 0 eng
010 _a 2010046637
020 _a9781609602000
035 _a(DLC)16547261
035 _a(DLC)2010046637
040 _aDLC
_cDLC
050 0 0 _aHD30.2
_b.S437 2011
082 0 0 _a005.8
_222
_bNE-S
100 _aNemati, Hamid R
_910468
245 0 0 _aSecurity and privacy assurance in advancing technologies
_bnew developments
260 _aHershey
_bInformation Science Reference
_c2011
263 _a1111
300 _axxxvii,456p.
504 _aIncludes bibliographical references and index.
505 0 _aRe-evaluation of on-line hot topic discover model / Hui-min Ye, Sushil Sharma, Huinan Xu -- Understanding user behavior toward passwords through acceptance and use modelling / Lee Novakovic, Tanya McGill, Michael Dixon -- Privacy loss : an expanded model of legal and illegal data exchange / Joanne H. Pratt, Joanne H. Pratt -- Do privacy statements really work? : the effect of privacy statements and fair information practices on trust and perceived risk in e-commerce / Hamid Nemati -- Thomas van Dyke -- Large key sizes and the security of password-based cryptography / Kent Boklan -- Information systems security assurance management at municipal software solutions, Inc. / Virginia Kleist, Bonnie Morris, James W. Denton -- Security and privacy in e-mail bounce back systems / Alex Kosachev -- Hamid nemati.
520 _a"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
650 0 _aInformation technology
_xSecurity measures.
_910469
650 0 _aManagement
_xTechnological innovations.
_910470
906 _a0
_bvip
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_01
999 _c12175
_d12175