Impact of digital transformation on security policies and standards
"This book summarizes the policies, standards, and mechanisms for security in all sort of digital applications. It also focuses on blockchain and its imminent impact on financial services in making a smart government along with bitcoin and the future of digital payments"
Saved in:
| Format: | Book |
|---|---|
| Language: | English |
| Published: |
Hershey, PA, USA
IGI Global, disseminator of knowledge
2020
|
| Series: | A volume in the Advances information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018)
Published: (2018)
Digital identity management
Published: (2015)
Published: (2015)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen
by: Cobb lhStephen
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
Identity and data security for web development best practices
by: LeBlanc, Jonathan, et al.
Published: (2016)
by: LeBlanc, Jonathan, et al.
Published: (2016)
The Browser Hacker's Handbook
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
The Hacker's handbook the strategy behind breaking into and defending networks
by: Young lhSusan
by: Young lhSusan
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
A NOVEL GRAPHICAL PASSWORD CLUSTERING METHOD FOR FAULT TOLERANCE MECHANISM
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2020)
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2020)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Data science for cyber-security
Published: (2019)
Published: (2019)
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Pixel-based graphical password scheme password from digital image file
by: Mohd Sidek Fadzil Mohd Yunus, et al.
by: Mohd Sidek Fadzil Mohd Yunus, et al.
Internet and intranet security
by: OppligerlhRolf
by: OppligerlhRolf
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Open systems standardization a business approach
by: Cargill
Published: (1997)
by: Cargill
Published: (1997)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Web security sourcebook
by: Rubin
Published: (1997)
by: Rubin
Published: (1997)
Client - side attacks and defense
by: Shimonski, Robert
Published: (2012)
by: Shimonski, Robert
Published: (2012)
Information security--the next decade : proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95
Published: (1995)
Published: (1995)
Network security assessment know your network
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
AAA identity management security
by: Santuka, Vivek
Published: (2011)
by: Santuka, Vivek
Published: (2011)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Similar Items
-
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018) -
Digital identity management
Published: (2015) -
Web security for network and system administrators
by: Mackey, David
Published: (2003) -
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013) -
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen


