Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner.
2014
TK5105.878 .S59 2014eb
Linked e-resources
Linked Resource
https://emu.idm.oclc.org/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=607739
Linked Resource
https://www.taylorfrancis.com/books/9780429093791
Details
Title
Unauthorized access : the crisis in online privacy and security / Robert H. Sloan, Richard Warner.
Author
Sloan, Robert H.
ISBN
9781439830147 (e-book)
1439830142 (e-book)
1439830134
9781439830130
9780429093791 (e-book : PDF)
0429093799
9781466548039 (e-book)
1466548037
9781138436923 (hardback)
1138436925
9781000218640 (online)
1000218643
9781299875692 (online)
1299875696
1439830142 (e-book)
1439830134
9781439830130
9780429093791 (e-book : PDF)
0429093799
9781466548039 (e-book)
1466548037
9781138436923 (hardback)
1138436925
9781000218640 (online)
1000218643
9781299875692 (online)
1299875696
Imprint
Boca Raton, Fla. : CRC Press, 2014.
Language
English
Description
1 online resource (xxiii, 354 pages)
Other Standard Identifiers
10.1201/b15148 doi
Call Number
TK5105.878 .S59 2014eb
System Control No.
(OCoLC)857078800
Bibliography, etc. Note
Includes bibliographical references.
Formatted Contents Note
Ch. 1. Introduction
ch. 2. An explanation of the internet, computers, and data mining
ch. 3. Norms and markets
ch. 4. Informational privacy : the general theory
ch. 5. Informational privacy : norms and value optimality
ch. 6. Software vulnerabilities and the low-priced software norm
ch. 7. Software vulnerabilities : creating best practices
ch. 8. Computers and networks : attack and defense
ch. 9. Malware, norms, and ISPs
ch. 10. Malware : creating a best practices norm
ch. 11. Tracking, contracting, and behavioral advertising
ch. 12. From one-sided chicken to value optimal norms.
ch. 2. An explanation of the internet, computers, and data mining
ch. 3. Norms and markets
ch. 4. Informational privacy : the general theory
ch. 5. Informational privacy : norms and value optimality
ch. 6. Software vulnerabilities and the low-priced software norm
ch. 7. Software vulnerabilities : creating best practices
ch. 8. Computers and networks : attack and defense
ch. 9. Malware, norms, and ISPs
ch. 10. Malware : creating a best practices norm
ch. 11. Tracking, contracting, and behavioral advertising
ch. 12. From one-sided chicken to value optimal norms.
Access Note
Open Access
Added Author
Warner, Richard, 1946-
Available in Other Form
Print version: Sloan, Robert H. Unauthorized access. Boca Raton, Fla. : CRC Press, 2014
Linked Resources
https://emu.idm.oclc.org/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=607739
https://www.taylorfrancis.com/books/9780429093791
https://www.taylorfrancis.com/books/9780429093791
Record Appears in
Books > E-books
All Resources
All Resources