Reference Hub6
Indices1
Information Security and Ethics: Concepts, Methodologies, Tools, and Applications

Information Security and Ethics: Concepts, Methodologies, Tools, and Applications

Copyright: © 2008 |Pages: 4478
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3
Cite Book Cite Book

MLA

Nemati, Hamid, editor. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3

APA

Nemati, H. (Ed.). (2008). Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. IGI Global. https://doi.org/10.4018/978-1-59904-937-3

Chicago

Nemati, Hamid, ed. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3

Export Reference

Mendeley
Favorite

Information Security and Ethics: Concepts, Methodologies, Tools, and Applicationsserves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges.

Compiling over 250 chapters representing the work of 484 international experts in these fields, this commanding, six-volume collection examines a complete array of topics in this area, including authentication technologies, cyber crime, cryptographic tools, monitoring systems, forensic computing, and confidentiality applications and their relation to raising the level of security and ethical standards in technology-driven environments. Essential to the information technology collection of any library, Information Security and Ethics: Concepts, Methodologies, Tools, and Applications will serve the needs of researchers in a variety of related fields, including business, e-commerce, government, law enforcement, and many more.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Book Series
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Fundamental Concepts and Theories
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Development and Design Methodologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Tools and Technologies  (pages 1107-1107)
Tools and Technologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Utilization and Application  (pages 1638-1638)
Utilization and Application
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Organizational and Social Implications
This content has been removed at the discretion of the publisher and the editors.
Chapter 6
Managerial Impact  (pages 2914-2914)
Managerial Impact
This content has been removed at the discretion of the publisher and the editors.
Chapter 7
Critical Issues  (pages 3083-3083)
Critical Issues
This content has been removed at the discretion of the publisher and the editors.
Chapter 8
Emerging Trends  (pages 3690-3690)
Emerging Trends
This content has been removed at the discretion of the publisher and the editors.
Back Materials
About the Editor
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.