008 |
|
091110s2008 xxua e b 001 0 eng d |
015 |
|
|a2007031962
|
020 |
|
|a9781599049373 ((set))
|
020 |
|
|a1599049376 ((set))
|
020 |
|
|a9781599049380 ((ebook))
|
020 |
|
|a1599049384 ((ebook))
|
035 |
|
|a(OCoLC)163593925
|
035 |
|
|a00268111
|
040 |
|
|aTMUE|beng|cTMUE|dTMUE
|
050 |
14
|
|aQA76.9.A25|bI54152 2008
|
082 |
04
|
|a005.8|222
|
245 |
00
|
|aInformation security and ethics : |bconcepts, methodologies, tools, and applications / |cHamid Nemati, [editor]
|
260 |
|
|aHershey, PA : |bInformation Science Reference, |cc2008
|
300 |
|
|a6 v. (lxxvi, 4037, 28 p.) : |bill ; |c29 cm
|
490 |
0
|
|aContemporary research in information science and technology
|
500 |
|
|a"Premier reference source"--Cover
|
504 |
|
|aIncludes bibliographical references and index
|
520 |
|
|a"This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges"--Provided by publisher
|
650 |
0
|
|aComputer security
|
650 |
0
|
|aInformation technology|xSecurity measures
|
650 |
0
|
|aInformation technology|xMoral and ethical aspects
|
700 |
1
|
|aNemati Hamid R|d1958
|