| 000 | 03012nam a22003737a 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20250625145201.0 | ||
| 008 | 250625b |||||||| |||| 00| 0 eng d | ||
| 020 |
_a9781447140504 _q(hardcover) |
||
| 040 |
_beng _cDLC _dDLC _erda _aSai University Library |
||
| 082 |
_223 _a006.754 _bABR |
||
| 245 |
_aComputational Social Networks : _bSecurity and Privacy / _cAjith Abraham |
||
| 260 |
_aLondon ; Heidelberg ; New York ; Dordrecht : _bSpringer, _c[2012] |
||
| 264 | 1 | _aLondon ; | |
| 264 | 1 | _aHeidelberg ; | |
| 264 | 1 | _aNew York ; | |
| 264 | 1 |
_aDordrecht : _bSpringer, _c[2012] |
|
| 264 | 4 | _c©2012 | |
| 300 |
_axiii, 347 pages : _billustrations ; _c24 cm |
||
| 336 |
_2rdacontent _atext _btxt |
||
| 337 |
_2rdamedia _aunmediated _bn |
||
| 338 |
_2rdacarrier _avolume _bnc |
||
| 500 | _aGifted by Ajith Abraham | ||
| 504 | _aIncludes bibliographical references and index | ||
| 520 | _aThe study of computational social networks (CSNs) is an emerging interdisciplinary field, concerned with the intersection of social behavior and computer systems. With the increasing popularity of social networking sites such as Myspace and Facebook, issues such as stalking, identity theft, sexual predators, and employee conduct have all become highly-publicized concerns. Many questions have also been raised about the ethics regarding the storage, management, and sharing of data held by CSNs. This comprehensive text/reference is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: Includes a thorough introduction to this exciting and blossoming field Presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats Discusses the design and use of a wide range of computational tools and software for social network analysis Describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization Provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology This authoritative work is a useful resource for researchers and developers involved in social network research and related issues. Postgraduate and senior undergraduate students will also find this a valuable reference for courses on CSNs. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures |
|
| 650 | 0 |
_aOnline social networks _xData processing |
|
| 650 | 0 | _aPrivacy, Right of | |
| 650 | 0 | _aWebometrics | |
| 650 | 0 | _aWeb usage mining | |
| 650 | 0 | _aComputational intelligence | |
| 700 | 1 | 0 |
_aAbraham, Ajith _eeditor |
| 942 |
_2ddc _cBK |
||
| 999 |
_c6821 _d6821 |
||