LEADER 03154nam 22007573 450 001 9910410652203321 005 20250204110808.0 010 $a9781439830147$b(electronic bk.) 010 $a9781000218640 010 $a1000218643 010 $a9780429093791 010 $a0429093799 010 $z9781439830130 010 $a1439830134 010 $a9781439830130 010 $a1439830134 024 3 $a9781138436923 035 $a(OCoLC)855859543 035 $a(MiFhGG)GVRL8QCD 035 $a(CKB)2670000000394397 035 $a(MiAaPQ)EBC7244861 035 $a(MiAaPQ)EBC1316387 035 $a(ODN)ODN0005916146 035 $a(MiFhGG)9781439830147 035 $a(ScCtBLL)2b821c79-fc47-49a2-8a07-861d408e34ad 035 $a(EXLCZ)992670000000394397 100 $a20231110h20172014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aUnauthorized access $ethe crisis in online privacy and security /$fRobert H. Sloan, Richard Warner 205 $a1st ed. 210 $d2016 210 1$aBoca Raton, FL :$cCRC Press,$d2017. 210 4$dİ2014 215 $a1 online resource (xxiii, 374 pages) $cillustrations 225 0 $aGale eBooks 300 $a"A Chapman & Hall book." 311 08$a1-4398-3014-2 311 08$a1-138-43692-5 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Contents at a Glance; Contents; Preface; Acknowledgments; Authors; Chapter 1 - Introduction; Chapter 2 - An Explanation of the Internet, Computers, and Data Mining; Chapter 3 - Norms and Markets; Chapter 4 - Informational Privacy: The General Theory; Chapter 5 - Informational Privacy: Norms and Value Optimality; Chapter 6 - Software Vulnerabilities and the Low-Priced Software Norm; Chapter 7 - Software Vulnerabilities: Creating Best Practices; Chapter 8 - Computers and Networks: Attack and Defense; Chapter 9 - Malware, Norms, and ISPs 327 $aChapter 10 - Malware: Creating a Best Practices NormChapter 11 - Tracking, Contracting, and Behavioral Advertising; Chapter 12 - From One-Sided Chicken to Value Optimal Norms; Back Cover 330 8 $aAnnotation$bThis text provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors explore the concept of informational privacy and suggest rules to limit the distribution of public information from private businesses. 606 $aInternet$xMoral and ethical aspects 606 $aPrivacy, Right of 606 $aComputer security 606 $aData protection 615 0$aInternet$xMoral and ethical aspects. 615 0$aPrivacy, Right of. 615 0$aComputer security. 615 0$aData protection. 676 $a323.4/302854678 686 $aCOM012040$aCOM021030$aCOM053000$2bisacsh 700 $aSloan$b Robert H.$059171 702 $aWarner$b Richard$f1946- 712 02$aCRC Press LLC. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910410652203321 996 $aUnauthorized Access$91965112 997 $aUNINA LEADER 01150nam0 22002891i 450 001 UON00050378 005 20231205102223.451 010 $a01-550-7674-4 100 $a20020107d1977 |0itac50 ba 101 $aeng 102 $aUS 105 $a|||| 1|||| 200 1 $aClassroom techniques$eForeign languages and English as a second language$fEdward D, Allen, Rebecca M. Valette 210 $aNew York$cHarcourt Brace Jovanovich$d1977 215 $aIX, 418 p.$d24 cm 606 $aLINGUISTICA$xInsegnamento$3UONC017182$2FI 620 $aUS$dNew York$3UONL000050 686 $aIG II$cInteresse generale - Linguistica$2A 700 1$aALLEN$bEdward David$3UONV031816$0650930 701 1$aVALETTE$bRebecca M.$3UONV031817$0195514 712 $aHarcourt Brace Jovanovich$3UONV249883$4650 801 $aIT$bSOL$c20250620$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00050378 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI IG II 067 $eSI SA 13004 5 067 996 $aClassroom techniques$91147938 997 $aUNIOR