Security and Privacy from a Legal, Ethical, and Technical Perspective.
Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. This book provides novel contributions and research efforts r...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | London : : IntechOpen,, 2020. ©2020. |
Year of Publication: | 2020 |
Edition: | 1st ed. |
Language: | English |
Physical Description: | 1 online resource (226 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993603255504498 |
---|---|
ctrlnum |
(CKB)5400000000042085 (MiAaPQ)EBC30390205 (Au-PeEL)EBL30390205 (NjHacI)995400000000042085 (EXLCZ)995400000000042085 |
collection |
bib_alma |
record_format |
marc |
spelling |
Kalloniatis, Christos. Security and Privacy from a Legal, Ethical, and Technical Perspective. 1st ed. London : IntechOpen, 2020. ©2020. 1 online resource (226 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on publisher supplied metadata and other sources. Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. This book provides novel contributions and research efforts related to security and privacy by shedding light on the legal, ethical, and technical aspects of security and privacy. This book consists of 12 chapters divided in three groups. The first contains works that discuss the ethical and legal aspects of security and privacy, the second contains works that focus more on the technical aspects of security and privacy, and the third contains works that show the applicability of various solutions in the aforementioned fields. This book is perfect for both experienced readers and young researchers that wish to read about the various aspects of security and privacy. Includes bibliographical references. Computer security Moral and ethical aspects. Computer security Law and legislation. Computer security. 1-83881-207-5 Travieso-Gonzalez, Carlos. |
language |
English |
format |
eBook |
author |
Kalloniatis, Christos. |
spellingShingle |
Kalloniatis, Christos. Security and Privacy from a Legal, Ethical, and Technical Perspective. |
author_facet |
Kalloniatis, Christos. Travieso-Gonzalez, Carlos. |
author_variant |
c k ck |
author2 |
Travieso-Gonzalez, Carlos. |
author2_variant |
c t g ctg |
author2_role |
TeilnehmendeR |
author_sort |
Kalloniatis, Christos. |
title |
Security and Privacy from a Legal, Ethical, and Technical Perspective. |
title_full |
Security and Privacy from a Legal, Ethical, and Technical Perspective. |
title_fullStr |
Security and Privacy from a Legal, Ethical, and Technical Perspective. |
title_full_unstemmed |
Security and Privacy from a Legal, Ethical, and Technical Perspective. |
title_auth |
Security and Privacy from a Legal, Ethical, and Technical Perspective. |
title_new |
Security and Privacy from a Legal, Ethical, and Technical Perspective. |
title_sort |
security and privacy from a legal, ethical, and technical perspective. |
publisher |
IntechOpen, |
publishDate |
2020 |
physical |
1 online resource (226 pages) |
edition |
1st ed. |
isbn |
1-83881-207-5 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 S438 42020 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT kalloniatischristos securityandprivacyfromalegalethicalandtechnicalperspective AT traviesogonzalezcarlos securityandprivacyfromalegalethicalandtechnicalperspective |
status_str |
n |
ids_txt_mv |
(CKB)5400000000042085 (MiAaPQ)EBC30390205 (Au-PeEL)EBL30390205 (NjHacI)995400000000042085 (EXLCZ)995400000000042085 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Security and Privacy from a Legal, Ethical, and Technical Perspective. |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1796653201748918272 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01434nam a22003493i 4500</leader><controlfield tag="001">993603255504498</controlfield><controlfield tag="005">20230620084600.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">230620s2020 xx o ||||0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000042085</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC30390205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30390205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995400000000042085</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000042085</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.S438 2020</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kalloniatis, Christos.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Privacy from a Legal, Ethical, and Technical Perspective.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (226 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. This book provides novel contributions and research efforts related to security and privacy by shedding light on the legal, ethical, and technical aspects of security and privacy. This book consists of 12 chapters divided in three groups. The first contains works that discuss the ethical and legal aspects of security and privacy, the second contains works that focus more on the technical aspects of security and privacy, and the third contains works that show the applicability of various solutions in the aforementioned fields. This book is perfect for both experienced readers and young researchers that wish to read about the various aspects of security and privacy.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Moral and ethical aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-83881-207-5</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Travieso-Gonzalez, Carlos.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-08 12:11:11 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5345718400004498&Force_direct=true</subfield><subfield code="Z">5345718400004498</subfield><subfield code="b">Available</subfield><subfield code="8">5345718400004498</subfield></datafield></record></collection> |