Unauthorized access : : the crisis in online privacy and security / / Robert H. Sloan, Richard Warner.
Annotation
Saved in:
: | |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | Boca Raton, FL : : CRC Press,, 2017. ©2014 |
Year of Publication: | 2017 |
Language: | English |
Series: | Gale eBooks
|
Physical Description: | 1 online resource (xxiii, 374 pages) :; illustrations |
Notes: | "A Chapman & Hall book." |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993655145404498 |
---|---|
ctrlnum |
(OCoLC)855859543 (MiFhGG)GVRL8QCD (CKB)2670000000394397 (MiAaPQ)EBC7244861 (EXLCZ)992670000000394397 |
collection |
bib_alma |
record_format |
marc |
spelling |
Sloan, Robert H., author. Unauthorized Access (Online) Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner. Boca Raton, FL : CRC Press, 2017. ©2014 1 online resource (xxiii, 374 pages) : illustrations text txt computer c online resource cr Gale eBooks Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover English OCLC-licensed vendor bibliographic record. Annotation This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors explore the concept of informational privacy and suggest rules to limit the distribution of public information from private businesses. Description based on print version record. "A Chapman & Hall book." Includes bibliographical references and index. Internet Moral and ethical aspects. Privacy, Right of. Computer security. Data protection. CRC Press LLC. 1-138-43692-5 1-4398-3014-2 Warner, Richard, 1946- author. |
language |
English |
format |
eBook |
author |
Sloan, Robert H., Warner, Richard, 1946- |
spellingShingle |
Sloan, Robert H., Warner, Richard, 1946- Unauthorized access : the crisis in online privacy and security / Gale eBooks Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover |
author_facet |
Sloan, Robert H., Warner, Richard, 1946- Warner, Richard, 1946- CRC Press LLC. CRC Press LLC. |
author_variant |
r h s rh rhs r w rw |
author_role |
VerfasserIn VerfasserIn |
author2 |
Warner, Richard, 1946- CRC Press LLC. |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
CRC Press LLC. |
author_sort |
Sloan, Robert H., |
title |
Unauthorized access : the crisis in online privacy and security / |
title_sub |
the crisis in online privacy and security / |
title_full |
Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner. |
title_fullStr |
Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner. |
title_full_unstemmed |
Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner. |
title_auth |
Unauthorized access : the crisis in online privacy and security / |
title_alt |
Unauthorized Access (Online) |
title_new |
Unauthorized access : |
title_sort |
unauthorized access : the crisis in online privacy and security / |
series |
Gale eBooks |
series2 |
Gale eBooks |
publisher |
CRC Press, |
publishDate |
2017 |
physical |
1 online resource (xxiii, 374 pages) : illustrations |
contents |
Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover |
isbn |
1-000-21864-3 0-429-09379-9 1-4398-3013-4 1-138-43692-5 1-4398-3014-2 |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.878 S59 42017 |
illustrated |
Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
320 - Political science |
dewey-ones |
323 - Civil & political rights |
dewey-full |
323.4/302854678 |
dewey-sort |
3323.4 9302854678 |
dewey-raw |
323.4/302854678 |
dewey-search |
323.4/302854678 |
oclc_num |
855859543 |
work_keys_str_mv |
AT sloanroberth unauthorizedaccessonline AT crcpressllc unauthorizedaccessonline AT warnerrichard unauthorizedaccessonline AT sloanroberth unauthorizedaccessthecrisisinonlineprivacyandsecurity AT crcpressllc unauthorizedaccessthecrisisinonlineprivacyandsecurity AT warnerrichard unauthorizedaccessthecrisisinonlineprivacyandsecurity |
status_str |
n |
ids_txt_mv |
(OCoLC)855859543 (MiFhGG)GVRL8QCD (CKB)2670000000394397 (MiAaPQ)EBC7244861 (EXLCZ)992670000000394397 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Unauthorized access : the crisis in online privacy and security / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1797826350052016129 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01640nam a22003973i 4500</leader><controlfield tag="001">993655145404498</controlfield><controlfield tag="005">20231110172225.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr un ---uuuua</controlfield><controlfield tag="008">231110t20172014fluao ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-000-21864-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-09379-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-4398-3013-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781138436923</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)855859543</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiFhGG)GVRL8QCD</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2670000000394397</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7244861</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992670000000394397</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.878</subfield><subfield code="b">.S59 2017</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">323.4/302854678</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sloan, Robert H.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Unauthorized Access (Online)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unauthorized access :</subfield><subfield code="b">the crisis in online privacy and security /</subfield><subfield code="c">Robert H. Sloan, Richard Warner.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiii, 374 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Gale eBooks</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">OCLC-licensed vendor bibliographic record.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">This text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors explore the concept of informational privacy and suggest rules to limit the distribution of public information from private businesses.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"A Chapman & Hall book."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Moral and ethical aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">CRC Press LLC.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-138-43692-5</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-4398-3014-2</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warner, Richard,</subfield><subfield code="d">1946-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-05-01 06:44:20 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2013-08-12 10:58:12 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338638930004498&Force_direct=true</subfield><subfield code="Z">5338638930004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338638930004498</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5339675870004498&Force_direct=true</subfield><subfield code="Z">5339675870004498</subfield><subfield code="b">Available</subfield><subfield code="8">5339675870004498</subfield></datafield></record></collection> |