The business of cybersecurity: foundations and ideologies
Chapter 1. Introduction to cybersecurity -- Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of di...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, New York (222 East 46th Street, New York, NY 10017)
Business Expert Press
2019
|
Ausgabe: | First edition |
Schriftenreihe: | Business law and corporate risk management collection
|
Schlagworte: | |
Online-Zugang: | FHN01 UBY01 Volltext |
Zusammenfassung: | Chapter 1. Introduction to cybersecurity -- Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of digital financial services and financial inclusion -- Chapter 6. The various steps of the processes of building cybersecure applications -- Chapter 7. The types of risks that emerge with the concept of fraud -- Chapter 8. Consumer protection and financial inclusion -- Chapter 9. Solar flares and quantum neural networks This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book createrenewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies |
Beschreibung: | Includes index |
Beschreibung: | 1 Online-Ressource (71 pages) |
ISBN: | 9781948976190 9781948976183 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047177528 | ||
003 | DE-604 | ||
005 | 20240417 | ||
007 | cr|uuu---uuuuu | ||
008 | 210305s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781948976190 |9 978-1-948976-19-0 | ||
020 | |a 9781948976183 |9 978-1-948976-18-3 | ||
035 | |a (ZDB-191-BEX)9781948976190 | ||
035 | |a (OCoLC)1102628043 | ||
035 | |a (DE-599)BVBBV047177528 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Sathnur, Ashwini |e Verfasser |4 aut | |
245 | 1 | 0 | |a The business of cybersecurity |b foundations and ideologies |c Ashwini Sathnur |
250 | |a First edition | ||
264 | 1 | |a New York, New York (222 East 46th Street, New York, NY 10017) |b Business Expert Press |c 2019 | |
300 | |a 1 Online-Ressource (71 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Business law and corporate risk management collection | |
500 | |a Includes index | ||
520 | |a Chapter 1. Introduction to cybersecurity -- Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of digital financial services and financial inclusion -- Chapter 6. The various steps of the processes of building cybersecure applications -- Chapter 7. The types of risks that emerge with the concept of fraud -- Chapter 8. Consumer protection and financial inclusion -- Chapter 9. Solar flares and quantum neural networks | ||
520 | |a This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book createrenewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Internet / Security measures | |
653 | |a Electronic books | ||
700 | 1 | |a Lee, Sam |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781948976183 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/BEPB0000887.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-191-BEX | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032582883 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/BEPB0000887.html |l FHN01 |p ZDB-191-BEX |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/BEPB0000887.html |l UBY01 |p ZDB-191-BEX |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182264432558080 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Sathnur, Ashwini Lee, Sam |
author_facet | Sathnur, Ashwini Lee, Sam |
author_role | aut aut |
author_sort | Sathnur, Ashwini |
author_variant | a s as s l sl |
building | Verbundindex |
bvnumber | BV047177528 |
collection | ZDB-191-BEX |
ctrlnum | (ZDB-191-BEX)9781948976190 (OCoLC)1102628043 (DE-599)BVBBV047177528 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02775nmm a2200457zc 4500</leader><controlfield tag="001">BV047177528</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240417 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210305s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781948976190</subfield><subfield code="9">978-1-948976-19-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781948976183</subfield><subfield code="9">978-1-948976-18-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-191-BEX)9781948976190</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1102628043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047177528</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sathnur, Ashwini</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The business of cybersecurity</subfield><subfield code="b">foundations and ideologies</subfield><subfield code="c">Ashwini Sathnur</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, New York (222 East 46th Street, New York, NY 10017)</subfield><subfield code="b">Business Expert Press</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (71 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Business law and corporate risk management collection</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Chapter 1. Introduction to cybersecurity -- Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of digital financial services and financial inclusion -- Chapter 6. The various steps of the processes of building cybersecure applications -- Chapter 7. The types of risks that emerge with the concept of fraud -- Chapter 8. Consumer protection and financial inclusion -- Chapter 9. Solar flares and quantum neural networks</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book createrenewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Sam</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781948976183</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/BEPB0000887.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-191-BEX</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032582883</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/BEPB0000887.html</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/BEPB0000887.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047177528 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:44:55Z |
indexdate | 2024-07-10T09:04:47Z |
institution | BVB |
isbn | 9781948976190 9781948976183 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032582883 |
oclc_num | 1102628043 |
open_access_boolean | |
owner | DE-92 DE-706 |
owner_facet | DE-92 DE-706 |
physical | 1 Online-Ressource (71 pages) |
psigel | ZDB-191-BEX |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Business Expert Press |
record_format | marc |
series2 | Business law and corporate risk management collection |
spelling | Sathnur, Ashwini Verfasser aut The business of cybersecurity foundations and ideologies Ashwini Sathnur First edition New York, New York (222 East 46th Street, New York, NY 10017) Business Expert Press 2019 1 Online-Ressource (71 pages) txt rdacontent c rdamedia cr rdacarrier Business law and corporate risk management collection Includes index Chapter 1. Introduction to cybersecurity -- Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of digital financial services and financial inclusion -- Chapter 6. The various steps of the processes of building cybersecure applications -- Chapter 7. The types of risks that emerge with the concept of fraud -- Chapter 8. Consumer protection and financial inclusion -- Chapter 9. Solar flares and quantum neural networks This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book createrenewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies Computer security Internet / Security measures Electronic books Lee, Sam aut Erscheint auch als Druck-Ausgabe 9781948976183 https://portal.igpublish.com/iglibrary/search/BEPB0000887.html Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Sathnur, Ashwini Lee, Sam The business of cybersecurity foundations and ideologies Computer security Internet / Security measures |
title | The business of cybersecurity foundations and ideologies |
title_auth | The business of cybersecurity foundations and ideologies |
title_exact_search | The business of cybersecurity foundations and ideologies |
title_exact_search_txtP | The business of cybersecurity foundations and ideologies |
title_full | The business of cybersecurity foundations and ideologies Ashwini Sathnur |
title_fullStr | The business of cybersecurity foundations and ideologies Ashwini Sathnur |
title_full_unstemmed | The business of cybersecurity foundations and ideologies Ashwini Sathnur |
title_short | The business of cybersecurity |
title_sort | the business of cybersecurity foundations and ideologies |
title_sub | foundations and ideologies |
topic | Computer security Internet / Security measures |
topic_facet | Computer security Internet / Security measures |
url | https://portal.igpublish.com/iglibrary/search/BEPB0000887.html |
work_keys_str_mv | AT sathnurashwini thebusinessofcybersecurityfoundationsandideologies AT leesam thebusinessofcybersecurityfoundationsandideologies |