Modern theories and practices for cyber ethics and security compliance:
"This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"--
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781799831501 |
DOI: | 10.4018/978-1-7998-3149-5 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046701259 | ||
003 | DE-604 | ||
005 | 20211110 | ||
007 | cr|uuu---uuuuu | ||
008 | 200502s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781799831501 |9 978-1-7998-3150-1 | ||
035 | |a (OCoLC)1153993668 | ||
035 | |a (DE-599)BVBBV046701259 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Modern theories and practices for cyber ethics and security compliance |c Winfred Yaokumah [and 4 others] |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Handbook of research on cyber security, cyber safety, and cyber ethics / Winfred Yaokumah, University of Ghana, Ghana, Muttukrishnan Rajarajan, University of London, United Kingdom, Jamal-Deen Abdulai, University of Ghana, Ghana, Isaac Wiafe, University of Ghana, Ghana, Ferdinand Katsriku, University of Ghana, Ghana -- Impact of cybercrime on South Africa's tourism industry : Impact of cybercrime on South Africa's tourism industry / Unathi Henama, Tshwane University of Technology, South Africa, Petrus Maphanga, Tshwane University of Technology, South Africa -- Taxonomy of login attacks in web application and their security techniques using behavioral biometrics / Rizwan Ur Rahman, Maulana Azad National Institute of Technology, Bhopal, India, Deepak Tomar, Maulana Azad National Institute of Technology, Bhopal, India | |
520 | |a "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- | ||
650 | 4 | |a Internet / Security measures | |
650 | 4 | |a Internet / Safety measures | |
650 | 4 | |a Internet / Moral and ethical aspects | |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yaokumah, Winfred |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-7998-3149-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, softcover |z 978-1-7998-5752-5 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-3149-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-3149-5 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-3149-5 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-3149-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-3149-5 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076706587836416 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Yaokumah, Winfred |
author2_role | edt |
author2_variant | w y wy |
author_facet | Yaokumah, Winfred |
building | Verbundindex |
bvnumber | BV046701259 |
collection | ZDB-98-IGB |
contents | Handbook of research on cyber security, cyber safety, and cyber ethics / Winfred Yaokumah, University of Ghana, Ghana, Muttukrishnan Rajarajan, University of London, United Kingdom, Jamal-Deen Abdulai, University of Ghana, Ghana, Isaac Wiafe, University of Ghana, Ghana, Ferdinand Katsriku, University of Ghana, Ghana -- Impact of cybercrime on South Africa's tourism industry : Impact of cybercrime on South Africa's tourism industry / Unathi Henama, Tshwane University of Technology, South Africa, Petrus Maphanga, Tshwane University of Technology, South Africa -- Taxonomy of login attacks in web application and their security techniques using behavioral biometrics / Rizwan Ur Rahman, Maulana Azad National Institute of Technology, Bhopal, India, Deepak Tomar, Maulana Azad National Institute of Technology, Bhopal, India |
ctrlnum | (OCoLC)1153993668 (DE-599)BVBBV046701259 |
doi_str_mv | 10.4018/978-1-7998-3149-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046701259</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211110</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200502s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799831501</subfield><subfield code="9">978-1-7998-3150-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1153993668</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046701259</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modern theories and practices for cyber ethics and security compliance</subfield><subfield code="c">Winfred Yaokumah [and 4 others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Handbook of research on cyber security, cyber safety, and cyber ethics / Winfred Yaokumah, University of Ghana, Ghana, Muttukrishnan Rajarajan, University of London, United Kingdom, Jamal-Deen Abdulai, University of Ghana, Ghana, Isaac Wiafe, University of Ghana, Ghana, Ferdinand Katsriku, University of Ghana, Ghana -- Impact of cybercrime on South Africa's tourism industry : Impact of cybercrime on South Africa's tourism industry / Unathi Henama, Tshwane University of Technology, South Africa, Petrus Maphanga, Tshwane University of Technology, South Africa -- Taxonomy of login attacks in web application and their security techniques using behavioral biometrics / Rizwan Ur Rahman, Maulana Azad National Institute of Technology, Bhopal, India, Deepak Tomar, Maulana Azad National Institute of Technology, Bhopal, India</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Safety measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yaokumah, Winfred</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-7998-3149-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, softcover</subfield><subfield code="z">978-1-7998-5752-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-3149-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3149-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3149-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3149-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-3149-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046701259 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:28:10Z |
indexdate | 2024-07-20T06:01:34Z |
institution | BVB |
isbn | 9781799831501 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032111803 |
oclc_num | 1153993668 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah [and 4 others] Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Handbook of research on cyber security, cyber safety, and cyber ethics / Winfred Yaokumah, University of Ghana, Ghana, Muttukrishnan Rajarajan, University of London, United Kingdom, Jamal-Deen Abdulai, University of Ghana, Ghana, Isaac Wiafe, University of Ghana, Ghana, Ferdinand Katsriku, University of Ghana, Ghana -- Impact of cybercrime on South Africa's tourism industry : Impact of cybercrime on South Africa's tourism industry / Unathi Henama, Tshwane University of Technology, South Africa, Petrus Maphanga, Tshwane University of Technology, South Africa -- Taxonomy of login attacks in web application and their security techniques using behavioral biometrics / Rizwan Ur Rahman, Maulana Azad National Institute of Technology, Bhopal, India, Deepak Tomar, Maulana Azad National Institute of Technology, Bhopal, India "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- Internet / Security measures Internet / Safety measures Internet / Moral and ethical aspects Ethik (DE-588)4015602-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Ethik (DE-588)4015602-3 s DE-604 Yaokumah, Winfred edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-7998-3149-5 Erscheint auch als Druck-Ausgabe, softcover 978-1-7998-5752-5 https://doi.org/10.4018/978-1-7998-3149-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Modern theories and practices for cyber ethics and security compliance Handbook of research on cyber security, cyber safety, and cyber ethics / Winfred Yaokumah, University of Ghana, Ghana, Muttukrishnan Rajarajan, University of London, United Kingdom, Jamal-Deen Abdulai, University of Ghana, Ghana, Isaac Wiafe, University of Ghana, Ghana, Ferdinand Katsriku, University of Ghana, Ghana -- Impact of cybercrime on South Africa's tourism industry : Impact of cybercrime on South Africa's tourism industry / Unathi Henama, Tshwane University of Technology, South Africa, Petrus Maphanga, Tshwane University of Technology, South Africa -- Taxonomy of login attacks in web application and their security techniques using behavioral biometrics / Rizwan Ur Rahman, Maulana Azad National Institute of Technology, Bhopal, India, Deepak Tomar, Maulana Azad National Institute of Technology, Bhopal, India Internet / Security measures Internet / Safety measures Internet / Moral and ethical aspects Ethik (DE-588)4015602-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4015602-3 (DE-588)4274324-2 |
title | Modern theories and practices for cyber ethics and security compliance |
title_auth | Modern theories and practices for cyber ethics and security compliance |
title_exact_search | Modern theories and practices for cyber ethics and security compliance |
title_exact_search_txtP | Modern theories and practices for cyber ethics and security compliance |
title_full | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah [and 4 others] |
title_fullStr | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah [and 4 others] |
title_full_unstemmed | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah [and 4 others] |
title_short | Modern theories and practices for cyber ethics and security compliance |
title_sort | modern theories and practices for cyber ethics and security compliance |
topic | Internet / Security measures Internet / Safety measures Internet / Moral and ethical aspects Ethik (DE-588)4015602-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Internet / Security measures Internet / Safety measures Internet / Moral and ethical aspects Ethik Computersicherheit |
url | https://doi.org/10.4018/978-1-7998-3149-5 |
work_keys_str_mv | AT yaokumahwinfred moderntheoriesandpracticesforcyberethicsandsecuritycompliance |