000 | 02953nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-1-4614-4139-7 | ||
003 | DE-He213 | ||
005 | 20200421112557.0 | ||
007 | cr nn 008mamaa | ||
008 | 120813s2013 xxu| s |||| 0|eng d | ||
020 |
_a9781461441397 _9978-1-4614-4139-7 |
||
024 | 7 |
_a10.1007/978-1-4614-4139-7 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aSecurity and Privacy in Social Networks _h[electronic resource] / _cedited by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2013. |
|
300 |
_aVI, 254 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction to Security and Privacy in Social Networks -- Interdisciplinary Impact Analysis of Privacy in Social Networks -- Recognizing Your Digital Friends -- Encryption for Peer-to-Peer Social Networks -- Crowdsourcing and Ethics -- The Effect of Social Status on Decision-Making and Prices in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) -- Applications of k-Anonymity and �-Diversity in Publishing Online Social Networks -- Links Reconstruction Attack -- An Analysis of Anonymity in the Bitcoin System -- Privacy-Preserving Data Integration using Decoupled Data. | |
520 | _aSecurity and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aAltshuler, Yaniv. _eeditor. |
|
700 | 1 |
_aElovici, Yuval. _eeditor. |
|
700 | 1 |
_aCremers, Armin B. _eeditor. |
|
700 | 1 |
_aAharony, Nadav. _eeditor. |
|
700 | 1 |
_aPentland, Alex. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781461441380 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-4139-7 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c59204 _d59204 |