Handbook of research on information and cyber security in the fourth industrial revolution
"This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrori...
Saved in:
| Format: | Book |
|---|---|
| Language: | English |
| Published: |
Hershey, PA
IGI Global
2018
|
| Series: | Advances in Information Security, Privacy, and Ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Fourth industrial revolution (4IR) adoption for Malaysia defence Industry
by: Mohd. Yusri Mokhtar
Published: (2023)
by: Mohd. Yusri Mokhtar
Published: (2023)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Impact of digital transformation on security policies and standards
Published: (2020)
Published: (2020)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Handbook of research on information security and assurance
Published: (2009)
Published: (2009)
Kerahsiaan = confidentiality
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen
by: Cobb lhStephen
Data science for cyber-security
Published: (2019)
Published: (2019)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
The Hacker's handbook the strategy behind breaking into and defending networks
by: Young lhSusan
by: Young lhSusan
The Browser Hacker's Handbook
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Digital identity management
Published: (2015)
Published: (2015)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
The art of compiler design Theory and practice
by: Pittman lhThomas
by: Pittman lhThomas
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Similar Items
-
Fourth industrial revolution (4IR) adoption for Malaysia defence Industry
by: Mohd. Yusri Mokhtar
Published: (2023) -
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018) -
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017) -
Impact of digital transformation on security policies and standards
Published: (2020)


