|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4614-4139-7 |
003 |
DE-He213 |
005 |
20220117173147.0 |
007 |
cr nn 008mamaa |
008 |
120813s2013 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781461441397
|9 978-1-4614-4139-7
|
024 |
7 |
|
|a 10.1007/978-1-4614-4139-7
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Security and Privacy in Social Networks
|h [electronic resource] /
|c edited by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a New York, NY :
|b Springer New York :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a VI, 254 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction to Security and Privacy in Social Networks -- Interdisciplinary Impact Analysis of Privacy in Social Networks -- Recognizing Your Digital Friends -- Encryption for Peer-to-Peer Social Networks -- Crowdsourcing and Ethics -- The Effect of Social Status on Decision-Making and Prices in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) -- Applications of k-Anonymity and ℓ-Diversity in Publishing Online Social Networks -- Links Reconstruction Attack -- An Analysis of Anonymity in the Bitcoin System -- Privacy-Preserving Data Integration using Decoupled Data.
|
520 |
|
|
|a Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Altshuler, Yaniv.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Elovici, Yuval.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Cremers, Armin B.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Aharony, Nadav.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Pentland, Alex.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461441380
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461441403
|
776 |
0 |
8 |
|i Printed edition:
|z 9781493901227
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4614-4139-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|