dc.contributor.editor |
Nemati, Hamid R. |
|
dc.date.accessioned |
2018-02-13T09:36:46Z |
|
dc.date.available |
2018-02-13T09:36:46Z |
|
dc.date.copyright |
2009 |
en_US |
dc.date.issued |
2018-02-13 |
|
dc.identifier.isbn |
9781599049373 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/7063 |
|
dc.language.iso |
en |
en_US |
dc.publisher |
IGI Global |
en_US |
dc.subject |
Computer security |
en_US |
dc.subject |
Information technology -- Security measures |
en_US |
dc.subject |
Information technology -- Moral and ethical aspects |
en_US |
dc.title |
Information security and ethics |
en_US |
dc.type |
Book / Chapter of a Book |
en_US |
dc.title.subtitle |
concepts, methodologies, tools and applications |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.physdesc |
6 volumes (lxxvi, 4037 pages) : illustrations |
en_US |
dc.publication.place |
Hershey Pa. |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references and index. |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.4018/978-1-59904-937-3.ch240 |
en_US |
dc.identifier.ctation |
Haraty, R. A. (2008). Security Issues in Distributed Transaction Processing Systems. In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 3572-3576). IGI Global. |
en_US |
dc.chapter.author |
Haraty, R. A. |
|
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.chapter.pages |
3392-3395 |
en_US |
dc.chapter.title |
Security Issues in Distributed Transaction Processing Systems |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://www.igi-global.com/chapter/information-security-ethics/23310 |
en_US |
dc.publication.date |
2009 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |
dc.orcid.id2 |
https://orcid.org/0000-0002-6978-3627 |
en_US |