Advances in cyberology and the advent of the next-gen information revolution:
"Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), the...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2023]
|
Schriftenreihe: | Advances in human and social aspects of technology
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | "Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"-- |
Beschreibung: | 1 Online-Ressource (xx, 271 Seiten) Illustrationen, Diagramme |
DOI: | 10.4018/978-1-6684-8133-2 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049061342 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 230721s2023 |||| o||u| ||||||eng d | ||
020 | |z 9781668481356 |9 9781668481356 | ||
020 | |z 1668481359 |9 1668481359 | ||
024 | 7 | |a 10.4018/978-1-6684-8133-2 |2 doi | |
035 | |a (ZDB-98-IGB)9781668481356 | ||
035 | |a (OCoLC)1392152614 | ||
035 | |a (DE-599)BVBBV049061342 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Advances in cyberology and the advent of the next-gen information revolution |c Mohd Shahid Husain (College of Applied Sciences, University of Technology and Applied Sciences, Oman), Mohammad Faisal (Integral University, Lucknow, India), Halima Sadia (Integral University, Lucknow, India), Tasneem Ahmad (Advanced Computing Research Lab, Integral University, Lucknow, India), Saurabh Shukla (Data Science Institute, National University of Ireland, Galway, Ireland) |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2023] | |
300 | |a 1 Online-Ressource (xx, 271 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in human and social aspects of technology | |
505 | 8 | |a Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness | |
520 | |a "Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"-- | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information storage and retrieval systems / Security measures | |
650 | 4 | |a Cyberspace | |
700 | 1 | |a Husain, Muhammad Shahid |4 edt | |
700 | 1 | |a Faisal, Mohammad |4 edt | |
700 | 1 | |a Sadia, Halima |4 edt | |
700 | 1 | |a Ahmed, Tasneem |4 edt | |
700 | 1 | |a Shukla, Saurabh |4 edt | |
710 | 2 | |a IGI Global |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-6684-8133-2 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-8133-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034323486 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8133-2 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8133-2 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8133-2 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808229140384448512 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Husain, Muhammad Shahid Faisal, Mohammad Sadia, Halima Ahmed, Tasneem Shukla, Saurabh |
author2_role | edt edt edt edt edt |
author2_variant | m s h ms msh m f mf h s hs t a ta s s ss |
author_facet | Husain, Muhammad Shahid Faisal, Mohammad Sadia, Halima Ahmed, Tasneem Shukla, Saurabh |
building | Verbundindex |
bvnumber | BV049061342 |
collection | ZDB-98-IGB |
contents | Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness |
ctrlnum | (ZDB-98-IGB)9781668481356 (OCoLC)1392152614 (DE-599)BVBBV049061342 |
doi_str_mv | 10.4018/978-1-6684-8133-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV049061342</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230721s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668481356</subfield><subfield code="9">9781668481356</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668481359</subfield><subfield code="9">1668481359</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-8133-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)9781668481356</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1392152614</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049061342</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cyberology and the advent of the next-gen information revolution</subfield><subfield code="c">Mohd Shahid Husain (College of Applied Sciences, University of Technology and Applied Sciences, Oman), Mohammad Faisal (Integral University, Lucknow, India), Halima Sadia (Integral University, Lucknow, India), Tasneem Ahmad (Advanced Computing Research Lab, Integral University, Lucknow, India), Saurabh Shukla (Data Science Institute, National University of Ireland, Galway, Ireland)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 271 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in human and social aspects of technology</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Husain, Muhammad Shahid</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Faisal, Mohammad</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sadia, Halima</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmed, Tasneem</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shukla, Saurabh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-6684-8133-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-8133-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034323486</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8133-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8133-2</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8133-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049061342 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:24:17Z |
indexdate | 2024-08-24T01:08:09Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034323486 |
oclc_num | 1392152614 |
open_access_boolean | |
owner | DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource (xx, 271 Seiten) Illustrationen, Diagramme |
psigel | ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in human and social aspects of technology |
spelling | Advances in cyberology and the advent of the next-gen information revolution Mohd Shahid Husain (College of Applied Sciences, University of Technology and Applied Sciences, Oman), Mohammad Faisal (Integral University, Lucknow, India), Halima Sadia (Integral University, Lucknow, India), Tasneem Ahmad (Advanced Computing Research Lab, Integral University, Lucknow, India), Saurabh Shukla (Data Science Institute, National University of Ireland, Galway, Ireland) Hershey PA, USA IGI Global [2023] 1 Online-Ressource (xx, 271 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Advances in human and social aspects of technology Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness "Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians"-- Computer networks / Security measures Computer security Information storage and retrieval systems / Security measures Cyberspace Husain, Muhammad Shahid edt Faisal, Mohammad edt Sadia, Halima edt Ahmed, Tasneem edt Shukla, Saurabh edt IGI Global Sonstige oth Erscheint auch als Druck-Ausgabe 978-1-6684-8133-2 https://doi.org/10.4018/978-1-6684-8133-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Advances in cyberology and the advent of the next-gen information revolution Chapter 1. Cloud computing cyber threats and vulnerabilities -- Chapter 2. The critical analysis of e-commerce web application vulnerabilities -- Chapter 3. The link between privacy and disclosure behavior in social networks -- Chapter 4. Cyber threat migration: perpetuating in the healthcare sector and agriculture and food industries -- Chapter 5. The critical impact of cyber threats on digital economy -- Chapter 6. Cyber threats in agriculture and the food industry: an Indian perspective -- Chapter 7. Security issues in the internet of things for the development of smart cities -- Chapter 8. Forensics analysis of NTFS file systems -- Chapter 9. Workplace cyberbullying in the remote-work era: a new dimension of cyberology -- Chapter 10. The rise of deepfake technology: issues, challenges, and countermeasures -- Chapter 11. An extensive study and review on dark web threats and detection techniques -- Chapter 12. Recent advances in cyber security laws and practices in India: implementation and awareness Computer networks / Security measures Computer security Information storage and retrieval systems / Security measures Cyberspace |
title | Advances in cyberology and the advent of the next-gen information revolution |
title_auth | Advances in cyberology and the advent of the next-gen information revolution |
title_exact_search | Advances in cyberology and the advent of the next-gen information revolution |
title_exact_search_txtP | Advances in cyberology and the advent of the next-gen information revolution |
title_full | Advances in cyberology and the advent of the next-gen information revolution Mohd Shahid Husain (College of Applied Sciences, University of Technology and Applied Sciences, Oman), Mohammad Faisal (Integral University, Lucknow, India), Halima Sadia (Integral University, Lucknow, India), Tasneem Ahmad (Advanced Computing Research Lab, Integral University, Lucknow, India), Saurabh Shukla (Data Science Institute, National University of Ireland, Galway, Ireland) |
title_fullStr | Advances in cyberology and the advent of the next-gen information revolution Mohd Shahid Husain (College of Applied Sciences, University of Technology and Applied Sciences, Oman), Mohammad Faisal (Integral University, Lucknow, India), Halima Sadia (Integral University, Lucknow, India), Tasneem Ahmad (Advanced Computing Research Lab, Integral University, Lucknow, India), Saurabh Shukla (Data Science Institute, National University of Ireland, Galway, Ireland) |
title_full_unstemmed | Advances in cyberology and the advent of the next-gen information revolution Mohd Shahid Husain (College of Applied Sciences, University of Technology and Applied Sciences, Oman), Mohammad Faisal (Integral University, Lucknow, India), Halima Sadia (Integral University, Lucknow, India), Tasneem Ahmad (Advanced Computing Research Lab, Integral University, Lucknow, India), Saurabh Shukla (Data Science Institute, National University of Ireland, Galway, Ireland) |
title_short | Advances in cyberology and the advent of the next-gen information revolution |
title_sort | advances in cyberology and the advent of the next gen information revolution |
topic | Computer networks / Security measures Computer security Information storage and retrieval systems / Security measures Cyberspace |
topic_facet | Computer networks / Security measures Computer security Information storage and retrieval systems / Security measures Cyberspace |
url | https://doi.org/10.4018/978-1-6684-8133-2 |
work_keys_str_mv | AT husainmuhammadshahid advancesincyberologyandtheadventofthenextgeninformationrevolution AT faisalmohammad advancesincyberologyandtheadventofthenextgeninformationrevolution AT sadiahalima advancesincyberologyandtheadventofthenextgeninformationrevolution AT ahmedtasneem advancesincyberologyandtheadventofthenextgeninformationrevolution AT shuklasaurabh advancesincyberologyandtheadventofthenextgeninformationrevolution AT igiglobal advancesincyberologyandtheadventofthenextgeninformationrevolution |