Advances in cyberology and the advent of the next-gen information revolution:
"Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), the...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2023.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"-- |
Beschreibung: | 20 PDFs (271 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781668481356 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00311443 | ||
003 | IGIG | ||
005 | 20230707134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 230707s2023 pau fob 001 0 eng d | ||
020 | |a 9781668481356 |q PDF | ||
020 | |z 1668481332 |q hardcover | ||
020 | |z 9781668481332 |q print | ||
024 | 7 | |a 10.4018/978-1-6684-8133-2 |2 doi | |
035 | |a (CaBNVSL)slc00004580 | ||
035 | |a (OCoLC)1389870545 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .A38 2023e | |
082 | 7 | |a 658.4/78 |2 23 | |
245 | 0 | 0 | |a Advances in cyberology and the advent of the next-gen information revolution |c edited by Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad and Saurabh Shukla. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2023. | |
300 | |a 20 PDFs (271 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | |a "Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"-- |c Provided by publisher. | ||
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 07/07/2023). | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Cyberspace. | |
650 | 0 | |a Information storage and retrieval systems |x Security measures. | |
700 | 1 | |a Ahmed, Tasneem |d 1985- |e editor. | |
700 | 1 | |a Faisal, Mohammad |c (Professor of computer application), |e editor. | |
700 | 1 | |a Husain, Muhammad Shahid, |e editor. | |
700 | 1 | |a Sadia, Halima |d 1984- |e editor. | |
700 | 1 | |a Shukla, Saurabh |d 1985- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1668481332 |z 9781668481332 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8133-2 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00311443 |
---|---|
_version_ | 1804751465758064640 |
adam_text | |
any_adam_object | |
author2 | Ahmed, Tasneem 1985- Faisal, Mohammad (Professor of computer application) Husain, Muhammad Shahid Sadia, Halima 1984- Shukla, Saurabh 1985- |
author2_role | edt edt edt edt edt |
author2_variant | t a ta m f mf m s h ms msh h s hs s s ss |
author_facet | Ahmed, Tasneem 1985- Faisal, Mohammad (Professor of computer application) Husain, Muhammad Shahid Sadia, Halima 1984- Shukla, Saurabh 1985- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .A38 2023e |
callnumber-search | TK5105.59 .A38 2023e |
callnumber-sort | TK 45105.59 A38 42023E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness. |
ctrlnum | (CaBNVSL)slc00004580 (OCoLC)1389870545 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03750nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00311443</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20230707134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">230707s2023 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668481356</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668481332</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668481332</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-8133-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00004580</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1389870545</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.A38 2023e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Advances in cyberology and the advent of the next-gen information revolution </subfield><subfield code="c">edited by Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad and Saurabh Shukla.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20 PDFs (271 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 07/07/2023).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information storage and retrieval systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmed, Tasneem</subfield><subfield code="d">1985-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Faisal, Mohammad</subfield><subfield code="c">(Professor of computer application),</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Husain, Muhammad Shahid,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sadia, Halima</subfield><subfield code="d">1984-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shukla, Saurabh</subfield><subfield code="d">1985-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668481332</subfield><subfield code="z">9781668481332</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8133-2</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00311443 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:59Z |
institution | BVB |
isbn | 9781668481356 |
language | English |
oclc_num | 1389870545 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 20 PDFs (271 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global, |
record_format | marc |
spelling | Advances in cyberology and the advent of the next-gen information revolution edited by Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad and Saurabh Shukla. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2023. 20 PDFs (271 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness. Restricted to subscribers or individual electronic text purchasers. "Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 07/07/2023). Computer networks Security measures. Computer security. Cyberspace. Information storage and retrieval systems Security measures. Ahmed, Tasneem 1985- editor. Faisal, Mohammad (Professor of computer application), editor. Husain, Muhammad Shahid, editor. Sadia, Halima 1984- editor. Shukla, Saurabh 1985- editor. IGI Global, publisher. Print version: 1668481332 9781668481332 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8133-2 Volltext |
spellingShingle | Advances in cyberology and the advent of the next-gen information revolution Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness. Computer networks Security measures. Computer security. Cyberspace. Information storage and retrieval systems Security measures. |
title | Advances in cyberology and the advent of the next-gen information revolution |
title_auth | Advances in cyberology and the advent of the next-gen information revolution |
title_exact_search | Advances in cyberology and the advent of the next-gen information revolution |
title_full | Advances in cyberology and the advent of the next-gen information revolution edited by Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad and Saurabh Shukla. |
title_fullStr | Advances in cyberology and the advent of the next-gen information revolution edited by Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad and Saurabh Shukla. |
title_full_unstemmed | Advances in cyberology and the advent of the next-gen information revolution edited by Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad and Saurabh Shukla. |
title_short | Advances in cyberology and the advent of the next-gen information revolution |
title_sort | advances in cyberology and the advent of the next gen information revolution |
topic | Computer networks Security measures. Computer security. Cyberspace. Information storage and retrieval systems Security measures. |
topic_facet | Computer networks Security measures. Computer security. Cyberspace. Information storage and retrieval systems Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-8133-2 |
work_keys_str_mv | AT ahmedtasneem advancesincyberologyandtheadventofthenextgeninformationrevolution AT faisalmohammad advancesincyberologyandtheadventofthenextgeninformationrevolution AT husainmuhammadshahid advancesincyberologyandtheadventofthenextgeninformationrevolution AT sadiahalima advancesincyberologyandtheadventofthenextgeninformationrevolution AT shuklasaurabh advancesincyberologyandtheadventofthenextgeninformationrevolution AT igiglobal advancesincyberologyandtheadventofthenextgeninformationrevolution |