Security and Privacy Assurance in Advancing Technologies: New Developments

Security and Privacy Assurance in Advancing Technologies: New Developments

Hamid Nemati (The University of North Carolina – Greensboro, USA)
Release Date: November, 2010|Copyright: © 2011 |Pages: 494
DOI: 10.4018/978-1-60960-200-0
ISBN13: 9781609602000|ISBN10: 1609602005|EISBN13: 9781609602024
Hardcover:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$162.00
List Price: $180.00
10% Discount:-$18.00
TOTAL SAVINGS: $18.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental agencies, and individuals must find ways to address the associated security and privacy implications of their actions and behaviors.

Security and Privacy Assurance in Advancing Technologies: New Developments provides a comprehensive collection of knowledge from experts within the field of information security and privacy. This book explores the changing roles of information technology and how this change will impact information security and privacy. The evolving nature of information security and privacy brings additional challenges and opportunities for all of us to carry into the future.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Consumer and business practices and trends
  • Database issues in privacy protection
  • Economic impact analysis
  • Encryption, authentication, and access control
  • File and file system security and privacy
  • Global Issues
  • Hacking and corruptions
  • Identity and privacy confidentiality
  • Peer-to-Peer computing
  • Relationships and trade-offs between security and privacy
  • Security and privacy techniques, management, and protocols
  • Tools, techniques, methods, and frameworks
  • Trends and new developments
Reviews and Testimonials

Academics and professionals in the fields of computer science and informatics present twenty-three papers on contemporary issues in information and data security and privacy in networking technologies. Articles present research covering such topics as the efficacy of privacy statements, password-based cryptography, small business health information security, cultural impacts on privacy and data security, thwarting 'man-in-the-middle' attacks, preserving privacy in data-mining operations and multimedia transmission privacy and security. ...

– Sci Tech Book News, BookNews.com
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Dr. Hamid Nemati is an Associate Professor of Information Systems at the Information Systems and Operations Management Department of The University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from The University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He also has extensive professional experience as a consultant with a number of major corporations. Dr. Nemati is the Editor-in-Chief of International Journal of Information Security and Privacy and the Advances in Information Security and Privacy (AISP) Book Series. His research specialization is in the areas of decision support systems, data warehousing and mining, and information security and privacy. His research articles have appeared in a number of premier journals. He has presented numerous research and scholarly papers nationally and internationally.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.