|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn962322960 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
161108s2016 enk ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d OCLCO
|d OCLCF
|d N$T
|d IDEBK
|d EBLCP
|d DG1
|d UPM
|d GZM
|d OCLCQ
|d UAB
|d CCO
|d K6U
|d MERUC
|d LOA
|d COCUF
|d ZCU
|d ICG
|d CNNOR
|d OCLCQ
|d D6H
|d OCLCQ
|d WRM
|d STF
|d OCLCQ
|d G3B
|d LVT
|d S8J
|d S9I
|d U3W
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d IEEEE
|d OCLCQ
|d OL$
|d HF9
|
019 |
|
|
|a 957156986
|a 957615709
|a 957679991
|a 959276222
|a 1058955642
|
020 |
|
|
|a 9781119347750
|q (electronic bk.)
|
020 |
|
|
|a 1119347750
|q (electronic bk.)
|
020 |
|
|
|a 9781119347323
|
020 |
|
|
|a 1119347327
|
020 |
|
|
|a 9781119347705
|
020 |
|
|
|a 111934770X
|
020 |
|
|
|z 9781786300782
|
020 |
|
|
|z 1786300788
|
024 |
7 |
|
|a 10.1002/9781119347750
|2 doi
|
029 |
1 |
|
|a AU@
|b 000059028802
|
029 |
1 |
|
|a CHBIS
|b 011150586
|
029 |
1 |
|
|a CHNEW
|b 000945618
|
029 |
1 |
|
|a CHVBK
|b 480257787
|
029 |
1 |
|
|a DEBSZ
|b 48506930X
|
029 |
1 |
|
|a GBVCP
|b 1002766559
|
035 |
|
|
|a (OCoLC)962322960
|z (OCoLC)957156986
|z (OCoLC)957615709
|z (OCoLC)957679991
|z (OCoLC)959276222
|z (OCoLC)1058955642
|
037 |
|
|
|a 9820802
|b IEEE
|
050 |
|
4 |
|a TK5105.59
|b .G84 2016
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Guerrier, Claudine,
|e author.
|
245 |
1 |
0 |
|a Security and privacy in the digital era.
|n Volume 1 /
|c Claudine Guerrier.
|
264 |
|
1 |
|a London :
|b ISTE ;
|a Hoboken, NJ :
|b Wiley,
|c 2016.
|
300 |
|
|
|a 1 online resource (xxvii, 252 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Innovation and Technology set
|
490 |
1 |
|
|a Innovation, entrepreneurship and management series
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover ; Title Page ; Copyright; Contents; Introduction; Part 1. Technology and Human Rights; 1. The Ideology of Human Rights; 1.1. Constitutional texts; 1.2. Some texts have an international scope; 1.3. European texts; 2. Protection of Personal Data; 2.1. Convention 108; 2.2. United Nations General Assembly Resolution 45/95 on December 14, 1990; 2.3. Sources of EU law; 3. Telecommunication Interception; 3.1. Jurisprudence of the EHCR; 3.2. Interceptions in the United States; 3.3. European states and interceptions; 3.4. Interception controls; 4. Biometrics and Videosurveillance.
|
505 |
8 |
|
|a 4.1. Biometrics4.2. Videosurveillance; Part 2. The Era of Surveillance and Control; 5. The Sources of Law in the Field of Security Illustrate This Change; 5.1. The USA; 5.2. The United Kingdom; 5.3. France; 6. Interceptions; 6.1. The United States of America; 6.2. France; 7. Other Methods of Surveillance; 7.1. Biometrics; 7.2. Passenger name record; 7.3. Data and files; 7.4. New technologies; geolocation, body scanners, drones are increasingly used; Part 3. Between Security and Freedom; 8. Towards Compromise; 8.1. Legal measures have been taken in order to protect some fundamental freedoms.
|
505 |
8 |
|
|a 8.2. European jurisprudence8.3. The monitoring continues to develop in the communications sector; Conclusion; Bibliography; Index; Other titles from iSTE in Innovation, Entrepreneurship and Management; EULA.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties." —Mireille Delmas Marty, Libertés et sûreté dans un monde dangereux, 2010 This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Law and legislation.
|
650 |
|
0 |
|a Electronic survaillance
|x Law and legislation.
|
650 |
|
0 |
|a Privacy, Right of.
|
650 |
|
0 |
|a Information technology
|x social aspect.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Guerrier, Claudine.
|t Security and privacy in the digital era. Volume 1.
|d London : ISTE ; Hoboken, NJ : Wiley, 2016
|z 9781786300782
|z 1786300788
|
830 |
|
0 |
|a Innovation, entrepreneurship and management series.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4648717
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4648717
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1339817
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis35385797
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13187444
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13132883
|
994 |
|
|
|a 92
|b IZTAP
|