Language:
English
繁體中文
Help
圖資館首頁
Login
Back
to Search results for
[ subject:"Privacy, Right of." ]
Switch To:
Labeled
|
MARC Mode
|
ISBD
Handbook of research on cyber crime ...
~
Cruz-Cunha, Maria Manuela, (1964-)
Handbook of research on cyber crime and information privacy
Record Type:
Electronic resources : Monograph/item
Title/Author:
Handbook of research on cyber crime and information privacyMaria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors.
other author:
Cruz-Cunha, Maria Manuela,
Published:
Hershey, Pennsylvania :IGI Global,2021.
Description:
1 online resource (xxix, 753 p.)
Subject:
Computer crimes.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-5728-0
ISBN:
9781799857297 (ebk.)
Handbook of research on cyber crime and information privacy
Handbook of research on cyber crime and information privacy
[electronic resource] /Maria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors. - Hershey, Pennsylvania :IGI Global,2021. - 1 online resource (xxix, 753 p.)
Includes bibliographical references and index.
Chapter 1. A black-box framework for malicious traffic detection in ICT environments -- Chapter 2. A survey of KYC/AML for cryptocurrencies transactions -- Chapter 3. A survey of methodologies for protecting privacy of user data within enterprise information infrastructure -- Chapter 4. An experimental analysis on detection of corona virus malware attacks and its preventive measures -- Chapter 5. An overview of recent development in privacy regulations and future research opportunities -- Chapter 6. An overview on protecting user private-attribute information on social networks -- Chapter 7. Challenges to multimedia privacy and security over social media -- Chapter 8. Computer forensics and cyber attacks -- Chapter 9. Contextual anomaly detection methods for addressing intrusion detection -- Chapter 10. Cyberbullying from a research viewpoint: a bibliometric approach -- Chapter 11. Detection and prediction of spam emails using machine learning models -- Chapter 12. Evolving cyber threats, combating techniques, and open issues in online social networks -- Chapter 13. Forensic readiness for enhanced ediscovery -- Chapter 14. Mobile device forensics investigation process: a systematic review -- Chapter 15. Fuzzy rule-based layered classifier and entropy-based feature selection for intrusion detection system -- Chapter 16. Hybrid intelligence framework for improvement of information security of critical infrastructures -- Chapter 17. Implementing information security using multimodal biometrics -- Chapter 18. Interdisciplinary training and mentoring for cyber security in companies -- Chapter 19. Learning with differential privacy -- Chapter 20. Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses -- Chapter 21. Modeling a cyber defense business ecosystem of ecosystems: nurturing Brazilian cyber defense resources -- Chapter 22. Oblivion is full of memory: legal issues raised in the EU by the right to erasure -- Chapter 23. Posmasweb: paranoid operating system methodology for anonymous and secure web browsing -- Chapter 24. Practical align overview of the main frameworks used by the companies to prevent cyber incidents -- Chapter 25. Prediction, detection, and mitigation of DDoS attacks using hpcs: design for a safer adaptive infrastructure -- Chapter 26. Preserving information security using fractal-based cryptosystem -- Chapter 27. Privacy in online social networks: threat analysis and countermeasures -- Chapter 28. Self-driving robotic cars: cyber security developments -- Chapter 29. Statistical methods for conducting the ontology and classifications of fake news on social media -- Chapter 30. Stuxnet-tool for zero-day attack -- Chapter 31. The intersection of cybercrime and the blockchain -- Chapter 32. User authentication into electronic health record based on reliable lightweight algorithms -- Chapter 33. Detecting the risk of online harms on people with social orientation impairments: the role of automated affective content screening of neuro-response plasticity.
"This book contains research on cyber-crime activities and approaches, developments, and practical examples of cyberspace security, personal and global privacy, information assurance, information protection, and ICT Law"--
ISBN: 9781799857297 (ebk.)Subjects--Topical Terms:
245152
Computer crimes.
LC Class. No.: HV6773 / .H36 2021
Dewey Class. No.: 364.16/8
Handbook of research on cyber crime and information privacy
LDR
:04189nmm a2200253 a 4500
001
603652
003
IGIG
005
20211027155715.0
006
m o d
007
cr cn
008
211118s2021 pau fob 001 0 eng d
020
$a
9781799857297 (ebk.)
020
$a
9781799857280 (hbk.)
035
$a
(OCoLC)1193106484
035
$a
1101012317
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
HV6773
$b
.H36 2021
082
0 0
$a
364.16/8
$2
23
245
0 0
$a
Handbook of research on cyber crime and information privacy
$h
[electronic resource] /
$c
Maria Manuela Cruz-Cunha and Nuno Ricardo Mateus-Coelho, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2021.
300
$a
1 online resource (xxix, 753 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. A black-box framework for malicious traffic detection in ICT environments -- Chapter 2. A survey of KYC/AML for cryptocurrencies transactions -- Chapter 3. A survey of methodologies for protecting privacy of user data within enterprise information infrastructure -- Chapter 4. An experimental analysis on detection of corona virus malware attacks and its preventive measures -- Chapter 5. An overview of recent development in privacy regulations and future research opportunities -- Chapter 6. An overview on protecting user private-attribute information on social networks -- Chapter 7. Challenges to multimedia privacy and security over social media -- Chapter 8. Computer forensics and cyber attacks -- Chapter 9. Contextual anomaly detection methods for addressing intrusion detection -- Chapter 10. Cyberbullying from a research viewpoint: a bibliometric approach -- Chapter 11. Detection and prediction of spam emails using machine learning models -- Chapter 12. Evolving cyber threats, combating techniques, and open issues in online social networks -- Chapter 13. Forensic readiness for enhanced ediscovery -- Chapter 14. Mobile device forensics investigation process: a systematic review -- Chapter 15. Fuzzy rule-based layered classifier and entropy-based feature selection for intrusion detection system -- Chapter 16. Hybrid intelligence framework for improvement of information security of critical infrastructures -- Chapter 17. Implementing information security using multimodal biometrics -- Chapter 18. Interdisciplinary training and mentoring for cyber security in companies -- Chapter 19. Learning with differential privacy -- Chapter 20. Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses -- Chapter 21. Modeling a cyber defense business ecosystem of ecosystems: nurturing Brazilian cyber defense resources -- Chapter 22. Oblivion is full of memory: legal issues raised in the EU by the right to erasure -- Chapter 23. Posmasweb: paranoid operating system methodology for anonymous and secure web browsing -- Chapter 24. Practical align overview of the main frameworks used by the companies to prevent cyber incidents -- Chapter 25. Prediction, detection, and mitigation of DDoS attacks using hpcs: design for a safer adaptive infrastructure -- Chapter 26. Preserving information security using fractal-based cryptosystem -- Chapter 27. Privacy in online social networks: threat analysis and countermeasures -- Chapter 28. Self-driving robotic cars: cyber security developments -- Chapter 29. Statistical methods for conducting the ontology and classifications of fake news on social media -- Chapter 30. Stuxnet-tool for zero-day attack -- Chapter 31. The intersection of cybercrime and the blockchain -- Chapter 32. User authentication into electronic health record based on reliable lightweight algorithms -- Chapter 33. Detecting the risk of online harms on people with social orientation impairments: the role of automated affective content screening of neuro-response plasticity.
520
3
$a
"This book contains research on cyber-crime activities and approaches, developments, and practical examples of cyberspace security, personal and global privacy, information assurance, information protection, and ICT Law"--
$c
Provided by publisher.
650
0
$a
Computer crimes.
$3
245152
650
0
$a
Computer security.
$3
184416
650
0
$a
Privacy, Right of.
$3
206659
700
1
$a
Cruz-Cunha, Maria Manuela,
$d
1964-
$3
529848
700
1
$a
Mateus-Coelho, Nuno Ricardo,
$d
1981-
$3
900263
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-5728-0
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000202383
電子館藏
1圖書
電子書
EB HV6773 .H36 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-5728-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login