008 |
|
130823s2013 paua b 001 0 eng |
010 |
|
|a 2012013064
|
020 |
|
|a9781466620506 :|cNT$5663
|
020 |
|
|a1466620501
|
020 |
|
|a9781466620513 (ebk.)
|
020 |
|
|a146662051X (ebk.)
|
020 |
|
|a9781466620520 (print & perpetual access)
|
020 |
|
|a1466620528 (print & perpetual access)
|
040 |
|
|aTWNTU|cTWNTU|dTWNTU
|
041 |
0
|
|aeng
|
042 |
|
|apcc
|
050 |
00
|
|aTK5105.59|b.P758 2013
|
082 |
00
|
|a005.8|223
|
095 |
|
|aNTTU|bG|cE050079|d005.8|eP961|tDDC
|
100 |
|
|a20140106d2013 m y0chiy08 e
|
105 |
|
|ay z 000yy
|
245 |
00
|
|aPrivacy solutions and security frameworks in information protection /|c[edited by] Hamid R. Nemati.
|
260 |
|
|aHershey, PA :|bInformation Science Reference,|cc2013.
|
300 |
|
|axviii, 288 p. :|bill. ;|c30 cm.
|
500 |
|
|a"Premier reference source"--Cover.
|
504 |
|
|aIncludes bibliographical references and index.
|
520 |
|
|a"This book explores the areas of concern in guaranteeing the security and privacy of data and related technologies, including a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners"--|cProvided by publisher.
|
650 |
0
|
|aComputer networks|xSecurity measures.
|
650 |
0
|
|aData protection.
|
650 |
0
|
|aConfidential communications.
|
650 |
0
|
|aComputers|xAccess control.
|
700 |
1
|
|aNemati, Hamid R.,|d1958-
|