Synchronizing E-Security
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods t...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2004
|
Ausgabe: | 1st ed. 2004 |
Schriftenreihe: | Advances in Information Security
10 |
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047063952 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2004 |||| o||u| ||||||eng d | ||
020 | |a 9781461504931 |9 978-1-4615-0493-1 | ||
024 | 7 | |a 10.1007/978-1-4615-0493-1 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-0493-1 | ||
035 | |a (OCoLC)1227478984 | ||
035 | |a (DE-599)BVBBV047063952 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.82 |2 23 | |
100 | 1 | |a Williams, Godfried B. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Synchronizing E-Security |c by Godfried B. Williams |
250 | |a 1st ed. 2004 | ||
264 | 1 | |a New York, NY |b Springer US |c 2004 | |
300 | |a 1 Online-Ressource (XVIII, 96 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security |v 10 | |
520 | |a Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a The Computing Profession | |
650 | 4 | |a e-Commerce/e-business | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a E-commerce | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402076466 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461351047 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461504948 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-0493-1 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471064 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-0493-1 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061353795584 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Williams, Godfried B. |
author_facet | Williams, Godfried B. |
author_role | aut |
author_sort | Williams, Godfried B. |
author_variant | g b w gb gbw |
building | Verbundindex |
bvnumber | BV047063952 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-0493-1 (OCoLC)1227478984 (DE-599)BVBBV047063952 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4615-0493-1 |
edition | 1st ed. 2004 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02550nmm a2200529zcb4500</leader><controlfield tag="001">BV047063952</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461504931</subfield><subfield code="9">978-1-4615-0493-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-0493-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-0493-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047063952</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Williams, Godfried B.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Synchronizing E-Security</subfield><subfield code="c">by Godfried B. Williams</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2004</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 96 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">10</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">The Computing Profession</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">e-Commerce/e-business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402076466</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461351047</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461504948</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-0493-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471064</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-0493-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047063952 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:21Z |
indexdate | 2024-07-10T09:01:33Z |
institution | BVB |
isbn | 9781461504931 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471064 |
oclc_num | 1227478984 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XVIII, 96 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Information Security |
spelling | Williams, Godfried B. Verfasser aut Synchronizing E-Security by Godfried B. Williams 1st ed. 2004 New York, NY Springer US 2004 1 Online-Ressource (XVIII, 96 p) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 10 Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user Cryptology Theory of Computation The Computing Profession e-Commerce/e-business Management of Computing and Information Systems Data encryption (Computer science) Computers E-commerce Management information systems Computer science Erscheint auch als Druck-Ausgabe 9781402076466 Erscheint auch als Druck-Ausgabe 9781461351047 Erscheint auch als Druck-Ausgabe 9781461504948 https://doi.org/10.1007/978-1-4615-0493-1 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Williams, Godfried B. Synchronizing E-Security Cryptology Theory of Computation The Computing Profession e-Commerce/e-business Management of Computing and Information Systems Data encryption (Computer science) Computers E-commerce Management information systems Computer science |
title | Synchronizing E-Security |
title_auth | Synchronizing E-Security |
title_exact_search | Synchronizing E-Security |
title_exact_search_txtP | Synchronizing E-Security |
title_full | Synchronizing E-Security by Godfried B. Williams |
title_fullStr | Synchronizing E-Security by Godfried B. Williams |
title_full_unstemmed | Synchronizing E-Security by Godfried B. Williams |
title_short | Synchronizing E-Security |
title_sort | synchronizing e security |
topic | Cryptology Theory of Computation The Computing Profession e-Commerce/e-business Management of Computing and Information Systems Data encryption (Computer science) Computers E-commerce Management information systems Computer science |
topic_facet | Cryptology Theory of Computation The Computing Profession e-Commerce/e-business Management of Computing and Information Systems Data encryption (Computer science) Computers E-commerce Management information systems Computer science |
url | https://doi.org/10.1007/978-1-4615-0493-1 |
work_keys_str_mv | AT williamsgodfriedb synchronizingesecurity |