Cyber security and business intelligence: innovations and machine learning for cyber risk management
"To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for sa...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Routledge
2024
|
Schriftenreihe: | Routledge studies in innovation, organizations and technology
|
Schlagworte: | |
Online-Zugang: | DE-706 Volltext |
Zusammenfassung: | "To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master's degree students and Ph.D. researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those on cyber risk management datasets. It will also leverage real-world financial instances to practice business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, reduce data breaches and cyber-attack vulnerabilities"-- |
Beschreibung: | 1 Online-Ressource (xii, 222 Seiten) Illustrationen |
ISBN: | 9781003285854 1003285856 9781003817789 1003817785 9781003817888 1003817882 |
DOI: | 10.4324/9781003285854 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV049695474 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240523s2024 xxk|||| o||u| ||||||eng d | ||
020 | |a 9781003285854 |9 9781003285854 | ||
020 | |a 1003285856 |9 1-003-28585-6 | ||
020 | |a 9781003817789 |c electronic bk. : PDF |9 978-1-003-81778-9 | ||
020 | |a 1003817785 |c electronic bk. : PDF |9 1-003-81778-5 | ||
020 | |a 9781003817888 |c electronic bk. : EPUB |9 978-1-003-81788-8 | ||
020 | |a 1003817882 |c electronic bk. : EPUB |9 1-003-81788-2 | ||
024 | 7 | |a 10.4324/9781003285854 |2 doi | |
035 | |a (ZDB-7-TFC)9781003285854 | ||
035 | |a (OCoLC)1437850431 | ||
035 | |a (DE-599)KEP099320010 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c XA-GB | ||
049 | |a DE-706 | ||
245 | 1 | 0 | |a Cyber security and business intelligence |b innovations and machine learning for cyber risk management |c edited by Mohammad Zoynul Abedin and Petr Hajek |
264 | 1 | |a London |b Routledge |c 2024 | |
300 | |a 1 Online-Ressource (xii, 222 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Routledge studies in innovation, organizations and technology | |
520 | 3 | |a "To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master's degree students and Ph.D. researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those on cyber risk management datasets. It will also leverage real-world financial instances to practice business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, reduce data breaches and cyber-attack vulnerabilities"-- | |
653 | 0 | |a Business intelligence | |
653 | 0 | |a Computer security | |
653 | 0 | |a Risk management | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Computer crimes / Prevention | |
653 | 0 | |a Sécurité informatique | |
653 | 0 | |a Gestion du risque | |
653 | 0 | |a Réseaux d'ordinateurs - Sécurité - Mesures | |
653 | 0 | |a risk management | |
653 | 0 | |a Business intelligence | |
653 | 0 | |a Computer crimes - Prevention | |
653 | 0 | |a Computer networks - Security measures | |
653 | 0 | |a Computer security | |
653 | 0 | |a Risk management | |
653 | 0 | |a BUSINESS & ECONOMICS / General | |
653 | 0 | |a BUSINESS & ECONOMICS / Information Management | |
700 | 1 | |a Abedin, Mohammad Zoynul |0 (DE-588)1219939609 |4 edt | |
700 | 1 | |a Hájek, Petr |d 1940- |0 (DE-588)143699024 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032259574 |
856 | 4 | 0 | |u https://doi.org/10.4324/9781003285854 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-7-TFC | ||
966 | e | |u https://doi.org/10.4324/9781003285854 |l DE-706 |p ZDB-7-TFC |q UBY_PDA_TFC_Kauf_23 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805082392974589952 |
---|---|
adam_text | |
any_adam_object | |
author2 | Abedin, Mohammad Zoynul Hájek, Petr 1940- |
author2_role | edt edt |
author2_variant | m z a mz mza p h ph |
author_GND | (DE-588)1219939609 (DE-588)143699024 |
author_facet | Abedin, Mohammad Zoynul Hájek, Petr 1940- |
building | Verbundindex |
bvnumber | BV049695474 |
collection | ZDB-7-TFC |
ctrlnum | (ZDB-7-TFC)9781003285854 (OCoLC)1437850431 (DE-599)KEP099320010 |
doi_str_mv | 10.4324/9781003285854 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a22000001c 4500</leader><controlfield tag="001">BV049695474</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240523s2024 xxk|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003285854</subfield><subfield code="9">9781003285854</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003285856</subfield><subfield code="9">1-003-28585-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003817789</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">978-1-003-81778-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003817785</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">1-003-81778-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003817888</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">978-1-003-81788-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003817882</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">1-003-81788-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4324/9781003285854</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-7-TFC)9781003285854</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1437850431</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP099320010</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security and business intelligence</subfield><subfield code="b">innovations and machine learning for cyber risk management</subfield><subfield code="c">edited by Mohammad Zoynul Abedin and Petr Hajek</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Routledge</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 222 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Routledge studies in innovation, organizations and technology</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master's degree students and Ph.D. researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those on cyber risk management datasets. It will also leverage real-world financial instances to practice business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, reduce data breaches and cyber-attack vulnerabilities"--</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Réseaux d'ordinateurs - Sécurité - Mesures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">risk management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes - Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks - Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">BUSINESS & ECONOMICS / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">BUSINESS & ECONOMICS / Information Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abedin, Mohammad Zoynul</subfield><subfield code="0">(DE-588)1219939609</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hájek, Petr</subfield><subfield code="d">1940-</subfield><subfield code="0">(DE-588)143699024</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032259574</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4324/9781003285854</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4324/9781003285854</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">UBY_PDA_TFC_Kauf_23</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049695474 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T07:31:57Z |
institution | BVB |
isbn | 9781003285854 1003285856 9781003817789 1003817785 9781003817888 1003817882 |
language | English |
oclc_num | 1437850431 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (xii, 222 Seiten) Illustrationen |
psigel | ZDB-7-TFC ZDB-7-TFC UBY_PDA_TFC_Kauf_23 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Routledge |
record_format | marc |
series2 | Routledge studies in innovation, organizations and technology |
spelling | Cyber security and business intelligence innovations and machine learning for cyber risk management edited by Mohammad Zoynul Abedin and Petr Hajek London Routledge 2024 1 Online-Ressource (xii, 222 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Routledge studies in innovation, organizations and technology "To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master's degree students and Ph.D. researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those on cyber risk management datasets. It will also leverage real-world financial instances to practice business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, reduce data breaches and cyber-attack vulnerabilities"-- Business intelligence Computer security Risk management Computer networks / Security measures Computer crimes / Prevention Sécurité informatique Gestion du risque Réseaux d'ordinateurs - Sécurité - Mesures risk management Computer crimes - Prevention Computer networks - Security measures BUSINESS & ECONOMICS / General BUSINESS & ECONOMICS / Information Management Abedin, Mohammad Zoynul (DE-588)1219939609 edt Hájek, Petr 1940- (DE-588)143699024 edt Erscheint auch als Druck-Ausgabe 9781032259574 https://doi.org/10.4324/9781003285854 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cyber security and business intelligence innovations and machine learning for cyber risk management |
title | Cyber security and business intelligence innovations and machine learning for cyber risk management |
title_auth | Cyber security and business intelligence innovations and machine learning for cyber risk management |
title_exact_search | Cyber security and business intelligence innovations and machine learning for cyber risk management |
title_full | Cyber security and business intelligence innovations and machine learning for cyber risk management edited by Mohammad Zoynul Abedin and Petr Hajek |
title_fullStr | Cyber security and business intelligence innovations and machine learning for cyber risk management edited by Mohammad Zoynul Abedin and Petr Hajek |
title_full_unstemmed | Cyber security and business intelligence innovations and machine learning for cyber risk management edited by Mohammad Zoynul Abedin and Petr Hajek |
title_short | Cyber security and business intelligence |
title_sort | cyber security and business intelligence innovations and machine learning for cyber risk management |
title_sub | innovations and machine learning for cyber risk management |
url | https://doi.org/10.4324/9781003285854 |
work_keys_str_mv | AT abedinmohammadzoynul cybersecurityandbusinessintelligenceinnovationsandmachinelearningforcyberriskmanagement AT hajekpetr cybersecurityandbusinessintelligenceinnovationsandmachinelearningforcyberriskmanagement |