Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Identity theft : = breakthroughs in ...
~
Information Resources Management Association,
Linked to FindBook
Google Book
Amazon
博客來
Identity theft : = breakthroughs in research and practice
Record Type:
Electronic resources : Monograph/item
Title/Author:
Identity theft :/ Information Resources Management Association, editor.
Reminder of title:
breakthroughs in research and practice
Published:
Hershey, Pennsylvania :IGI Global, : [2017],
Description:
1 online resource (x, 441 p.) :ill.
[NT 15003449]:
Privacy, security, and identity theft protection: advances and trends / Guillermo A. Francia III, Frances Shannon Hutchinson, Xavier Paris Francia -- Overview of the U.S. criminal justice system and safety tips for international students / Thomas C. Johnson -- Identity and access management in the cloud computing environments / Manoj V. Thomas, K. Chandrasekaran -- A routine activity theory-based framework for combating cybercrime / Dillon Glasser, Aakash Taneja -- Security and privacy issues, solutions, and tools for MCC / Darshan M. Tank -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Identity management systems: models, standards, and COTS offerings / Reema Bhatt, Manish Gupta, Raj Sharman -- The German electronic identity card: lessons learned / Christoph Sorge -- The role of radio frequency identification in modern libraries / Kijpokin Kasemsap -- A novel technique for securing e-commerce transaction / Arnab K. Maji -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Cybercrimes technologies and approaches / WeSam Musa -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi --
[NT 15003449]:
The value of personal information / K.Y Williams, Dana-Marie Thomas, LaToya N. Johnson -- How private is your financial data?: survey of authentication methods in web and mobile banking / Vidya Mulukutla, Manish Gupta, H. R. Rao -- Cyber-crimes against adolescents: bridges between a psychological and a design approach / Filipa da Silva Pereira, Marlene Alexandra Veloso de Matos, {acute}Alvaro Miguel do C{acute}eu Gramaxo Oliveira Sampaio -- Privacy dangers of wearables and the internet of things / Scott Amyx -- User authentication based on dynamic keystroke recognition / Khaled Mohammed Fouad, Basma Mohammed Hassan, Mahmoud F. Hassan.
Subject:
Identity theft. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0808-3
ISBN:
9781522508090 (e-book)
Identity theft : = breakthroughs in research and practice
Identity theft :
breakthroughs in research and practice[electronic resource] /Information Resources Management Association, editor. - Hershey, Pennsylvania :IGI Global,[2017] - 1 online resource (x, 441 p.) :ill.
Includes bibliographical references and index.
Privacy, security, and identity theft protection: advances and trends / Guillermo A. Francia III, Frances Shannon Hutchinson, Xavier Paris Francia -- Overview of the U.S. criminal justice system and safety tips for international students / Thomas C. Johnson -- Identity and access management in the cloud computing environments / Manoj V. Thomas, K. Chandrasekaran -- A routine activity theory-based framework for combating cybercrime / Dillon Glasser, Aakash Taneja -- Security and privacy issues, solutions, and tools for MCC / Darshan M. Tank -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Identity management systems: models, standards, and COTS offerings / Reema Bhatt, Manish Gupta, Raj Sharman -- The German electronic identity card: lessons learned / Christoph Sorge -- The role of radio frequency identification in modern libraries / Kijpokin Kasemsap -- A novel technique for securing e-commerce transaction / Arnab K. Maji -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Cybercrimes technologies and approaches / WeSam Musa -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi --
Restricted to subscribers or individual electronic text purchasers.
"This book highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one's identity is compromised"--Provided by publisher.
ISBN: 9781522508090 (e-book)Subjects--Topical Terms:
1569054
Identity theft.
LC Class. No.: HV6675 / .I344 2017e
Dewey Class. No.: 364.16/33
Identity theft : = breakthroughs in research and practice
LDR
:03337nmm 2200289 a 4500
001
2183993
003
IGIG
005
20191022105153.0
006
m o d
007
cr cn
008
191225s2017 paua fob 001 0 eng d
010
$z
2016024525
020
$a
9781522508090 (e-book)
020
$a
9781522508083 (hardback)
035
$a
(OCoLC)960848593
035
$a
1081021237
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
HV6675
$b
.I344 2017e
082
0 0
$a
364.16/33
$2
23
245
0 0
$a
Identity theft :
$b
breakthroughs in research and practice
$h
[electronic resource] /
$c
Information Resources Management Association, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2017]
300
$a
1 online resource (x, 441 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Privacy, security, and identity theft protection: advances and trends / Guillermo A. Francia III, Frances Shannon Hutchinson, Xavier Paris Francia -- Overview of the U.S. criminal justice system and safety tips for international students / Thomas C. Johnson -- Identity and access management in the cloud computing environments / Manoj V. Thomas, K. Chandrasekaran -- A routine activity theory-based framework for combating cybercrime / Dillon Glasser, Aakash Taneja -- Security and privacy issues, solutions, and tools for MCC / Darshan M. Tank -- National security policy and strategy and cyber security risks / Olivera Injac, Ramo Sendelj -- Identity management systems: models, standards, and COTS offerings / Reema Bhatt, Manish Gupta, Raj Sharman -- The German electronic identity card: lessons learned / Christoph Sorge -- The role of radio frequency identification in modern libraries / Kijpokin Kasemsap -- A novel technique for securing e-commerce transaction / Arnab K. Maji -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Cybercrimes technologies and approaches / WeSam Musa -- A wrapper-based classification approach for personal identification through keystroke dynamics using soft computing techniques / Shanmugapriya D., Padmavathi Ganapathi -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi --
505
8
$a
The value of personal information / K.Y Williams, Dana-Marie Thomas, LaToya N. Johnson -- How private is your financial data?: survey of authentication methods in web and mobile banking / Vidya Mulukutla, Manish Gupta, H. R. Rao -- Cyber-crimes against adolescents: bridges between a psychological and a design approach / Filipa da Silva Pereira, Marlene Alexandra Veloso de Matos, {acute}Alvaro Miguel do C{acute}eu Gramaxo Oliveira Sampaio -- Privacy dangers of wearables and the internet of things / Scott Amyx -- User authentication based on dynamic keystroke recognition / Khaled Mohammed Fouad, Basma Mohammed Hassan, Mahmoud F. Hassan.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one's identity is compromised"--Provided by publisher.
650
0
$a
Identity theft.
$3
1569054
650
0
$a
Identity theft
$x
Prevention.
$3
3395711
650
0
$a
Internet
$x
Security measures.
$3
590477
650
0
$a
Internet
$x
Safety measures.
$3
912623
650
0
$a
Computer crimes.
$3
583792
710
2
$a
Information Resources Management Association,
$e
editor.
$3
3208430
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0808-3
based on 0 review(s)
Location:
全部
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9371522
電子資源
11.線上閱覽_V
電子書
EB HV6675 .I344 2017e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login