Unauthorized access : : the crisis in online privacy and security / / Robert H. Sloan, Richard Warner.

Annotation

Saved in:
Bibliographic Details
:
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Boca Raton, FL : : CRC Press,, 2017.
©2014
Year of Publication:2017
Language:English
Series:Gale eBooks
Physical Description:1 online resource (xxiii, 374 pages) :; illustrations
Notes:"A Chapman & Hall book."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993655145404498
ctrlnum (OCoLC)855859543
(MiFhGG)GVRL8QCD
(CKB)2670000000394397
(MiAaPQ)EBC7244861
(EXLCZ)992670000000394397
collection bib_alma
record_format marc
spelling Sloan, Robert H., author.
Unauthorized Access (Online)
Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner.
Boca Raton, FL : CRC Press, 2017.
©2014
1 online resource (xxiii, 374 pages) : illustrations
text txt
computer c
online resource cr
Gale eBooks
Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs
Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover
English
OCLC-licensed vendor bibliographic record.
Annotation This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors explore the concept of informational privacy and suggest rules to limit the distribution of public information from private businesses.
Description based on print version record.
"A Chapman & Hall book."
Includes bibliographical references and index.
Internet Moral and ethical aspects.
Privacy, Right of.
Computer security.
Data protection.
CRC Press LLC.
1-138-43692-5
1-4398-3014-2
Warner, Richard, 1946- author.
language English
format eBook
author Sloan, Robert H.,
Warner, Richard, 1946-
spellingShingle Sloan, Robert H.,
Warner, Richard, 1946-
Unauthorized access : the crisis in online privacy and security /
Gale eBooks
Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs
Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover
author_facet Sloan, Robert H.,
Warner, Richard, 1946-
Warner, Richard, 1946-
CRC Press LLC.
CRC Press LLC.
author_variant r h s rh rhs
r w rw
author_role VerfasserIn
VerfasserIn
author2 Warner, Richard, 1946-
CRC Press LLC.
author2_role TeilnehmendeR
TeilnehmendeR
author_corporate CRC Press LLC.
author_sort Sloan, Robert H.,
title Unauthorized access : the crisis in online privacy and security /
title_sub the crisis in online privacy and security /
title_full Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner.
title_fullStr Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner.
title_full_unstemmed Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner.
title_auth Unauthorized access : the crisis in online privacy and security /
title_alt Unauthorized Access (Online)
title_new Unauthorized access :
title_sort unauthorized access : the crisis in online privacy and security /
series Gale eBooks
series2 Gale eBooks
publisher CRC Press,
publishDate 2017
physical 1 online resource (xxiii, 374 pages) : illustrations
contents Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs
Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover
isbn 1-000-21864-3
0-429-09379-9
1-4398-3013-4
1-138-43692-5
1-4398-3014-2
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.878 S59 42017
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 320 - Political science
dewey-ones 323 - Civil & political rights
dewey-full 323.4/302854678
dewey-sort 3323.4 9302854678
dewey-raw 323.4/302854678
dewey-search 323.4/302854678
oclc_num 855859543
work_keys_str_mv AT sloanroberth unauthorizedaccessonline
AT crcpressllc unauthorizedaccessonline
AT warnerrichard unauthorizedaccessonline
AT sloanroberth unauthorizedaccessthecrisisinonlineprivacyandsecurity
AT crcpressllc unauthorizedaccessthecrisisinonlineprivacyandsecurity
AT warnerrichard unauthorizedaccessthecrisisinonlineprivacyandsecurity
status_str n
ids_txt_mv (OCoLC)855859543
(MiFhGG)GVRL8QCD
(CKB)2670000000394397
(MiAaPQ)EBC7244861
(EXLCZ)992670000000394397
carrierType_str_mv cr
is_hierarchy_title Unauthorized access : the crisis in online privacy and security /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1797826350052016129
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01640nam a22003973i 4500</leader><controlfield tag="001">993655145404498</controlfield><controlfield tag="005">20231110172225.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr un ---uuuua</controlfield><controlfield tag="008">231110t20172014fluao ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-000-21864-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-09379-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-4398-3013-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781138436923</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)855859543</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiFhGG)GVRL8QCD</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2670000000394397</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7244861</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992670000000394397</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.878</subfield><subfield code="b">.S59 2017</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">323.4/302854678</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sloan, Robert H.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Unauthorized Access (Online)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unauthorized access :</subfield><subfield code="b">the crisis in online privacy and security /</subfield><subfield code="c">Robert H. Sloan, Richard Warner.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiii, 374 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Gale eBooks</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">OCLC-licensed vendor bibliographic record.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors explore the concept of informational privacy and suggest rules to limit the distribution of public information from private businesses.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"A Chapman &amp; Hall book."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Moral and ethical aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">CRC Press LLC.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-138-43692-5</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-4398-3014-2</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warner, Richard,</subfield><subfield code="d">1946-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-05-01 06:44:20 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2013-08-12 10:58:12 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338638930004498&amp;Force_direct=true</subfield><subfield code="Z">5338638930004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338638930004498</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5339675870004498&amp;Force_direct=true</subfield><subfield code="Z">5339675870004498</subfield><subfield code="b">Available</subfield><subfield code="8">5339675870004498</subfield></datafield></record></collection>