Information security and ethics: concepts, methodologies, tools, and applications
"This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges" - Provided by publisher
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2008]
|
Schriftenreihe: | Premier reference source
|
Schlagwörter: | |
Links: | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3 https://doi.org/10.4018/978-1-59904-937-3 https://doi.org/10.4018/978-1-59904-937-3 https://doi.org/10.4018/978-1-59904-937-3 https://doi.org/10.4018/978-1-59904-937-3 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3 |
Zusammenfassung: | "This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges" - Provided by publisher |
Beschreibung: | Includes bibliographical references and index Druckausgabe in 6 Bänden erschienen |
Umfang: | 1 Online-Ressource (xxxviii, 4037 Seiten, Seite lxxvi, 28 Seiten) |
ISBN: | 9781599049380 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044801027 | ||
003 | DE-604 | ||
005 | 20210914 | ||
007 | cr|uuu---uuuuu | ||
008 | 180301s2008 xx o|||| 00||| eng d | ||
020 | |a 9781599049380 |9 978-1-59904-938-0 | ||
024 | 7 | |a 10.4018/978-1-59904-937-3 |2 doi | |
035 | |a (OCoLC)1027758165 | ||
035 | |a (DE-599)BVBBV044801027 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
130 | 0 | |a Information security and ethics (concepts, methodologies, tools, and applications) | |
245 | 1 | 0 | |a Information security and ethics |b concepts, methodologies, tools, and applications |c Hamid Nemati (The University of North Carolina at Greensboro, USA) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2008] | |
264 | 4 | |c © 2008 | |
300 | |a 1 Online-Ressource (xxxviii, 4037 Seiten, Seite lxxvi, 28 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
500 | |a Druckausgabe in 6 Bänden erschienen | ||
520 | |a "This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges" - Provided by publisher | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Nemati, Hamid R. |d 1958- |0 (DE-588)140041923 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59904-937-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59904-937-6 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
912 | |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030195982 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-937-3 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-937-3 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-937-3 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-937-3 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818983969514848256 |
---|---|
any_adam_object | |
author2 | Nemati, Hamid R. 1958- |
author2_role | edt |
author2_variant | h r n hr hrn |
author_GND | (DE-588)140041923 |
author_facet | Nemati, Hamid R. 1958- |
building | Verbundindex |
bvnumber | BV044801027 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1027758165 (DE-599)BVBBV044801027 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02866nam a2200553 c 4500</leader><controlfield tag="001">BV044801027</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210914 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180301s2008 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599049380</subfield><subfield code="9">978-1-59904-938-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59904-937-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027758165</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044801027</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="130" ind1="0" ind2=" "><subfield code="a">Information security and ethics (concepts, methodologies, tools, and applications)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and ethics</subfield><subfield code="b">concepts, methodologies, tools, and applications</subfield><subfield code="c">Hamid Nemati (The University of North Carolina at Greensboro, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2008]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxviii, 4037 Seiten, Seite lxxvi, 28 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Druckausgabe in 6 Bänden erschienen</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges" - Provided by publisher</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nemati, Hamid R.</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)140041923</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59904-937-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59904-937-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030195982</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-937-3</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-937-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-937-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-937-3</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044801027 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:11:33Z |
institution | BVB |
isbn | 9781599049380 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030195982 |
oclc_num | 1027758165 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xxxviii, 4037 Seiten, Seite lxxvi, 28 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Information security and ethics (concepts, methodologies, tools, and applications) Information security and ethics concepts, methodologies, tools, and applications Hamid Nemati (The University of North Carolina at Greensboro, USA) Hershey ; New York Information Science Reference [2008] © 2008 1 Online-Ressource (xxxviii, 4037 Seiten, Seite lxxvi, 28 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references and index Druckausgabe in 6 Bänden erschienen "This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges" - Provided by publisher Computersicherheit (DE-588)4274324-2 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Ethik (DE-588)4015602-3 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Informationstechnik (DE-588)4026926-7 s Ethik (DE-588)4015602-3 s DE-604 Nemati, Hamid R. 1958- (DE-588)140041923 edt Erscheint auch als Druck-Ausgabe 978-1-59904-937-3 Erscheint auch als Druck-Ausgabe 1-59904-937-6 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Information security and ethics concepts, methodologies, tools, and applications Computersicherheit (DE-588)4274324-2 gnd Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4026926-7 (DE-588)4015602-3 (DE-588)4143413-4 |
title | Information security and ethics concepts, methodologies, tools, and applications |
title_alt | Information security and ethics (concepts, methodologies, tools, and applications) |
title_auth | Information security and ethics concepts, methodologies, tools, and applications |
title_exact_search | Information security and ethics concepts, methodologies, tools, and applications |
title_full | Information security and ethics concepts, methodologies, tools, and applications Hamid Nemati (The University of North Carolina at Greensboro, USA) |
title_fullStr | Information security and ethics concepts, methodologies, tools, and applications Hamid Nemati (The University of North Carolina at Greensboro, USA) |
title_full_unstemmed | Information security and ethics concepts, methodologies, tools, and applications Hamid Nemati (The University of North Carolina at Greensboro, USA) |
title_short | Information security and ethics |
title_sort | information security and ethics concepts methodologies tools and applications |
title_sub | concepts, methodologies, tools, and applications |
topic | Computersicherheit (DE-588)4274324-2 gnd Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd |
topic_facet | Computersicherheit Informationstechnik Ethik Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3 |
work_keys_str_mv | UT informationsecurityandethicsconceptsmethodologiestoolsandapplications AT nematihamidr informationsecurityandethicsconceptsmethodologiestoolsandapplications |