Impact of digital transformation on security policies and standards:
"This book summarizes the policies, standards, and mechanisms for security in all sort of digital applications. It also focuses on blockchain and its imminent impact on financial services in making a smart government along with bitcoin and the future of digital payments"--
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | "This book summarizes the policies, standards, and mechanisms for security in all sort of digital applications. It also focuses on blockchain and its imminent impact on financial services in making a smart government along with bitcoin and the future of digital payments"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781799823698 |
DOI: | 10.4018/978-1-7998-2367-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046691785 | ||
003 | DE-604 | ||
005 | 20211109 | ||
007 | cr|uuu---uuuuu | ||
008 | 200423s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781799823698 |9 978-1-7998-2369-8 | ||
035 | |a (OCoLC)1152229908 | ||
035 | |a (DE-599)BVBBV046691785 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Impact of digital transformation on security policies and standards |c Sam Goundar, Bharath Bhushan, Vaishali Ravindra Thakare |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Chapter 1. Digital transformation and its effects on various sectors: Indian perspective -- Chapter 2. A case study on data vulnerabilities in software development lifecycle model -- Chapter 3. Digital transformation of diplomacy: the way forward for small island states -- Chapter 4. Information security policies and procedures guidance for agencies -- Chapter 5. Cryptography security services: network security, attacks, and mechanisms -- Chapter 6. Analysing ethical issues of a patient information systems using the PAPA model -- Chapter 7. Blockchain technology and its applications -- Chapter 8. Consequent formation in security with blockchain in digital transformation -- Chapter 9. Network security evaluation and threat assessments in enterprise systems -- Chapter 10. Intellectual property rights protection in cyberspace: an Indian perspective -- Chapter 11. Efficient and secure data access control in the cloud environment | |
520 | |a "This book summarizes the policies, standards, and mechanisms for security in all sort of digital applications. It also focuses on blockchain and its imminent impact on financial services in making a smart government along with bitcoin and the future of digital payments"-- | ||
650 | 4 | |a Computer networks / Security measures / Standards | |
650 | 4 | |a Data protection | |
650 | 4 | |a Electronic information resources / Access control | |
650 | 4 | |a Electronic data interchange / Security measures | |
650 | 7 | |a Computer networks / Security measures / Standards |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Electronic data interchange / Security measures |2 fast | |
650 | 7 | |a Electronic information resources / Access control |2 fast | |
700 | 1 | |a Goundar, Sam |4 edt | |
700 | 1 | |a Bhushan, Bharat |4 edt | |
700 | 1 | |a Thakare, Vaishali Ravindra |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-2367-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, softcover |z 978-1-7998-2368-1 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-2367-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-2367-4 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2367-4 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2367-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-2367-4 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076706860466176 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Goundar, Sam Bhushan, Bharat Thakare, Vaishali Ravindra |
author2_role | edt edt edt |
author2_variant | s g sg b b bb v r t vr vrt |
author_facet | Goundar, Sam Bhushan, Bharat Thakare, Vaishali Ravindra |
building | Verbundindex |
bvnumber | BV046691785 |
collection | ZDB-98-IGB |
contents | Chapter 1. Digital transformation and its effects on various sectors: Indian perspective -- Chapter 2. A case study on data vulnerabilities in software development lifecycle model -- Chapter 3. Digital transformation of diplomacy: the way forward for small island states -- Chapter 4. Information security policies and procedures guidance for agencies -- Chapter 5. Cryptography security services: network security, attacks, and mechanisms -- Chapter 6. Analysing ethical issues of a patient information systems using the PAPA model -- Chapter 7. Blockchain technology and its applications -- Chapter 8. Consequent formation in security with blockchain in digital transformation -- Chapter 9. Network security evaluation and threat assessments in enterprise systems -- Chapter 10. Intellectual property rights protection in cyberspace: an Indian perspective -- Chapter 11. Efficient and secure data access control in the cloud environment |
ctrlnum | (OCoLC)1152229908 (DE-599)BVBBV046691785 |
doi_str_mv | 10.4018/978-1-7998-2367-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046691785</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211109</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200423s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799823698</subfield><subfield code="9">978-1-7998-2369-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1152229908</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046691785</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Impact of digital transformation on security policies and standards</subfield><subfield code="c">Sam Goundar, Bharath Bhushan, Vaishali Ravindra Thakare</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1. Digital transformation and its effects on various sectors: Indian perspective -- Chapter 2. A case study on data vulnerabilities in software development lifecycle model -- Chapter 3. Digital transformation of diplomacy: the way forward for small island states -- Chapter 4. Information security policies and procedures guidance for agencies -- Chapter 5. Cryptography security services: network security, attacks, and mechanisms -- Chapter 6. Analysing ethical issues of a patient information systems using the PAPA model -- Chapter 7. Blockchain technology and its applications -- Chapter 8. Consequent formation in security with blockchain in digital transformation -- Chapter 9. Network security evaluation and threat assessments in enterprise systems -- Chapter 10. Intellectual property rights protection in cyberspace: an Indian perspective -- Chapter 11. Efficient and secure data access control in the cloud environment</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book summarizes the policies, standards, and mechanisms for security in all sort of digital applications. It also focuses on blockchain and its imminent impact on financial services in making a smart government along with bitcoin and the future of digital payments"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data interchange / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures / Standards</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data interchange / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic information resources / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goundar, Sam</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhushan, Bharat</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thakare, Vaishali Ravindra</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-2367-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, softcover</subfield><subfield code="z">978-1-7998-2368-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-2367-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2367-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2367-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2367-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-2367-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046691785 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:25:18Z |
indexdate | 2024-07-20T06:01:34Z |
institution | BVB |
isbn | 9781799823698 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032102522 |
oclc_num | 1152229908 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Impact of digital transformation on security policies and standards Sam Goundar, Bharath Bhushan, Vaishali Ravindra Thakare Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Chapter 1. Digital transformation and its effects on various sectors: Indian perspective -- Chapter 2. A case study on data vulnerabilities in software development lifecycle model -- Chapter 3. Digital transformation of diplomacy: the way forward for small island states -- Chapter 4. Information security policies and procedures guidance for agencies -- Chapter 5. Cryptography security services: network security, attacks, and mechanisms -- Chapter 6. Analysing ethical issues of a patient information systems using the PAPA model -- Chapter 7. Blockchain technology and its applications -- Chapter 8. Consequent formation in security with blockchain in digital transformation -- Chapter 9. Network security evaluation and threat assessments in enterprise systems -- Chapter 10. Intellectual property rights protection in cyberspace: an Indian perspective -- Chapter 11. Efficient and secure data access control in the cloud environment "This book summarizes the policies, standards, and mechanisms for security in all sort of digital applications. It also focuses on blockchain and its imminent impact on financial services in making a smart government along with bitcoin and the future of digital payments"-- Computer networks / Security measures / Standards Data protection Electronic information resources / Access control Electronic data interchange / Security measures Computer networks / Security measures / Standards fast Data protection fast Electronic data interchange / Security measures fast Electronic information resources / Access control fast Goundar, Sam edt Bhushan, Bharat edt Thakare, Vaishali Ravindra edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-2367-4 Erscheint auch als Druck-Ausgabe, softcover 978-1-7998-2368-1 https://doi.org/10.4018/978-1-7998-2367-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Impact of digital transformation on security policies and standards Chapter 1. Digital transformation and its effects on various sectors: Indian perspective -- Chapter 2. A case study on data vulnerabilities in software development lifecycle model -- Chapter 3. Digital transformation of diplomacy: the way forward for small island states -- Chapter 4. Information security policies and procedures guidance for agencies -- Chapter 5. Cryptography security services: network security, attacks, and mechanisms -- Chapter 6. Analysing ethical issues of a patient information systems using the PAPA model -- Chapter 7. Blockchain technology and its applications -- Chapter 8. Consequent formation in security with blockchain in digital transformation -- Chapter 9. Network security evaluation and threat assessments in enterprise systems -- Chapter 10. Intellectual property rights protection in cyberspace: an Indian perspective -- Chapter 11. Efficient and secure data access control in the cloud environment Computer networks / Security measures / Standards Data protection Electronic information resources / Access control Electronic data interchange / Security measures Computer networks / Security measures / Standards fast Data protection fast Electronic data interchange / Security measures fast Electronic information resources / Access control fast |
title | Impact of digital transformation on security policies and standards |
title_auth | Impact of digital transformation on security policies and standards |
title_exact_search | Impact of digital transformation on security policies and standards |
title_exact_search_txtP | Impact of digital transformation on security policies and standards |
title_full | Impact of digital transformation on security policies and standards Sam Goundar, Bharath Bhushan, Vaishali Ravindra Thakare |
title_fullStr | Impact of digital transformation on security policies and standards Sam Goundar, Bharath Bhushan, Vaishali Ravindra Thakare |
title_full_unstemmed | Impact of digital transformation on security policies and standards Sam Goundar, Bharath Bhushan, Vaishali Ravindra Thakare |
title_short | Impact of digital transformation on security policies and standards |
title_sort | impact of digital transformation on security policies and standards |
topic | Computer networks / Security measures / Standards Data protection Electronic information resources / Access control Electronic data interchange / Security measures Computer networks / Security measures / Standards fast Data protection fast Electronic data interchange / Security measures fast Electronic information resources / Access control fast |
topic_facet | Computer networks / Security measures / Standards Data protection Electronic information resources / Access control Electronic data interchange / Security measures |
url | https://doi.org/10.4018/978-1-7998-2367-4 |
work_keys_str_mv | AT goundarsam impactofdigitaltransformationonsecuritypoliciesandstandards AT bhushanbharat impactofdigitaltransformationonsecuritypoliciesandstandards AT thakarevaishaliravindra impactofdigitaltransformationonsecuritypoliciesandstandards |