Reference Hub2
Indices1
Social Network Engineering for Secure Web Data and Services

Social Network Engineering for Secure Web Data and Services

Copyright: © 2013 |Pages: 322
ISBN13: 9781466639263|ISBN10: 1466639261|EISBN13: 9781466639270
DOI: 10.4018/978-1-4666-3926-3
Cite Book Cite Book

MLA

Caviglione, Luca, et al., editors. Social Network Engineering for Secure Web Data and Services. IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3926-3

APA

Caviglione, L., Coccoli, M., & Merlo, A. (Eds.). (2013). Social Network Engineering for Secure Web Data and Services. IGI Global. https://doi.org/10.4018/978-1-4666-3926-3

Chicago

Caviglione, Luca, Mauro Coccoli, and Alessio Merlo, eds. Social Network Engineering for Secure Web Data and Services. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3926-3

Export Reference

Mendeley
Favorite Full-Book Download

While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the internet; these platforms are not only used for content sharing purposes. They are also used to support and develop new services and applications.

Social Network Engineering for Secure Web Data and Services provides empirical research on the engineering of social network infrastructures, the development of novel applications, and the impact of social network- based services over the internet. This comprehensive collection highlights issues and solutions developed to prevent security threats and introduce proper countermeasures for attacks on every level. This book is useful for professionals and researchers in the field of social network and web security.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Fundamentals  (pages 17-17)
Fundamentals
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Applications  (pages 66-66)
Applications
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Security  (pages 161-161)
Security
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.