Security and Privacy from a Legal, Ethical, and Technical Perspective.

Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. This book provides novel contributions and research efforts r...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:London : : IntechOpen,, 2020.
©2020.
Year of Publication:2020
Edition:1st ed.
Language:English
Physical Description:1 online resource (226 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993603255504498
ctrlnum (CKB)5400000000042085
(MiAaPQ)EBC30390205
(Au-PeEL)EBL30390205
(NjHacI)995400000000042085
(EXLCZ)995400000000042085
collection bib_alma
record_format marc
spelling Kalloniatis, Christos.
Security and Privacy from a Legal, Ethical, and Technical Perspective.
1st ed.
London : IntechOpen, 2020.
©2020.
1 online resource (226 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on publisher supplied metadata and other sources.
Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. This book provides novel contributions and research efforts related to security and privacy by shedding light on the legal, ethical, and technical aspects of security and privacy. This book consists of 12 chapters divided in three groups. The first contains works that discuss the ethical and legal aspects of security and privacy, the second contains works that focus more on the technical aspects of security and privacy, and the third contains works that show the applicability of various solutions in the aforementioned fields. This book is perfect for both experienced readers and young researchers that wish to read about the various aspects of security and privacy.
Includes bibliographical references.
Computer security Moral and ethical aspects.
Computer security Law and legislation.
Computer security.
1-83881-207-5
Travieso-Gonzalez, Carlos.
language English
format eBook
author Kalloniatis, Christos.
spellingShingle Kalloniatis, Christos.
Security and Privacy from a Legal, Ethical, and Technical Perspective.
author_facet Kalloniatis, Christos.
Travieso-Gonzalez, Carlos.
author_variant c k ck
author2 Travieso-Gonzalez, Carlos.
author2_variant c t g ctg
author2_role TeilnehmendeR
author_sort Kalloniatis, Christos.
title Security and Privacy from a Legal, Ethical, and Technical Perspective.
title_full Security and Privacy from a Legal, Ethical, and Technical Perspective.
title_fullStr Security and Privacy from a Legal, Ethical, and Technical Perspective.
title_full_unstemmed Security and Privacy from a Legal, Ethical, and Technical Perspective.
title_auth Security and Privacy from a Legal, Ethical, and Technical Perspective.
title_new Security and Privacy from a Legal, Ethical, and Technical Perspective.
title_sort security and privacy from a legal, ethical, and technical perspective.
publisher IntechOpen,
publishDate 2020
physical 1 online resource (226 pages)
edition 1st ed.
isbn 1-83881-207-5
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 S438 42020
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT kalloniatischristos securityandprivacyfromalegalethicalandtechnicalperspective
AT traviesogonzalezcarlos securityandprivacyfromalegalethicalandtechnicalperspective
status_str n
ids_txt_mv (CKB)5400000000042085
(MiAaPQ)EBC30390205
(Au-PeEL)EBL30390205
(NjHacI)995400000000042085
(EXLCZ)995400000000042085
carrierType_str_mv cr
is_hierarchy_title Security and Privacy from a Legal, Ethical, and Technical Perspective.
author2_original_writing_str_mv noLinkedField
_version_ 1796653201748918272
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01434nam a22003493i 4500</leader><controlfield tag="001">993603255504498</controlfield><controlfield tag="005">20230620084600.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">230620s2020 xx o ||||0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000042085</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC30390205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30390205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995400000000042085</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000042085</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.S438 2020</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kalloniatis, Christos.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Privacy from a Legal, Ethical, and Technical Perspective.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (226 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understanding and realizing the security and privacy challenges for information systems is a very critical and demanding task for both software engineers and developers to design and implement reliable and trustworthy information systems. This book provides novel contributions and research efforts related to security and privacy by shedding light on the legal, ethical, and technical aspects of security and privacy. This book consists of 12 chapters divided in three groups. The first contains works that discuss the ethical and legal aspects of security and privacy, the second contains works that focus more on the technical aspects of security and privacy, and the third contains works that show the applicability of various solutions in the aforementioned fields. This book is perfect for both experienced readers and young researchers that wish to read about the various aspects of security and privacy.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Moral and ethical aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-83881-207-5</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Travieso-Gonzalez, Carlos.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-08 12:11:11 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5345718400004498&amp;Force_direct=true</subfield><subfield code="Z">5345718400004498</subfield><subfield code="b">Available</subfield><subfield code="8">5345718400004498</subfield></datafield></record></collection>