Reference Hub3
Indices2
Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues

Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues

Copyright: © 2009 |Pages: 414
ISBN13: 9781605662107|ISBN10: 1605662100|EISBN13: 9781605662114|ISBN13 Softcover: 9781616924997
DOI: 10.4018/978-1-60566-210-7
Cite Book Cite Book

MLA

Nemati, Hamid, editor. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. IGI Global, 2009. https://doi.org/10.4018/978-1-60566-210-7

APA

Nemati, H. (Ed.). (2009). Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. IGI Global. https://doi.org/10.4018/978-1-60566-210-7

Chicago

Nemati, Hamid, ed. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-210-7

Export Reference

Mendeley
Favorite Full-Book Download

Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities.

Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Book Series
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Information Security and Privacy
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Privacy Preservation and Techniques
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Authentication Techniques  (pages 148-148)
Authentication Techniques
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Security and Privacy Management
This content has been removed at the discretion of the publisher and the editors.
Web Security and Privacy Issues and Technologies
This content has been removed at the discretion of the publisher and the editors.
Evaluating Information Security and Privacy
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.