Anbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
EUR 4,22
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. Security, Privacy, and Trust in Modern Data Management (Data-Centric Systems and Applications) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping.
Anbieter: MusicMagpie, Stockport, Vereinigtes Königreich
EUR 4,21
Anzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. 1753699329. 7/28/2025 10:42:09 AM.
Anbieter: Bahamut Media, Reading, Vereinigtes Königreich
EUR 4,22
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping.
gebundene Ausgabe. Zustand: Gut. 472 Seiten; Das hier angebotene Buch stammt aus einer teilaufgelösten wissenschaftlichen Bibliothek und trägt die entsprechenden Kennzeichnungen (Rückenschild, Instituts-Stempel.); Schnitt und Einband sind etwas staubschmutzig; der Buchzustand ist ansonsten ordentlich und dem Alter entsprechend gut. Text in ENGLISCHER Sprache! Sprache: Englisch Gewicht in Gramm: 950.
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Hervorragend. Zustand: Hervorragend | Seiten: 496 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2007
ISBN 10: 3540698604 ISBN 13: 9783540698609
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 204,91
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 1st edition. 471 pages. 9.25x6.25x1.25 inches. In Stock.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2007
ISBN 10: 3540698604 ISBN 13: 9783540698609
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf- mation to access services, they literally leave a part of their life on record. As the number of sites where such records are left increases, so does the d- ger of misuse. So-called identity theft has become a pervasive problem, and a general feeling of unease and lack of trust may dissuade people from using the services on o er. This,inanutshell,isoneofthemajorchallengesinsecurityengineering- day. How to provide servicesto individuals securelywithout making undue - cursions into their privacy at the same time. Decisions on the limits of privacy intrusions - or privacy protection, for that matter - are ultimately political decisions. Research can de ne the design space in which service providers and regulators may try to nd acceptable tradeo s between security and privacy.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Mai 2007, 2007
ISBN 10: 3540698604 ISBN 13: 9783540698609
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf- mation to access services, they literally leave a part of their life on record. As the number of sites where such records are left increases, so does the d- ger of misuse. So-called identity theft has become a pervasive problem, and a general feeling of unease and lack of trust may dissuade people from using the services on o er. This,inanutshell,isoneofthemajorchallengesinsecurityengineering- day. How to provide servicesto individuals securelywithout making undue - cursions into their privacy at the same time. Decisions on the limits of privacy intrusions ¿ or privacy protection, for that matter ¿ are ultimately political decisions. Research can de ne the design space in which service providers and regulators may try to nd acceptable tradeo s between security and privacy.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 496 pp. Englisch.