Strategies for e-commerce data security:
In the landscape of e-commerce, data security has become a concern as businesses navigate the complexities of sensitive customer information protection and cyber threat mitigation. Strategies involving cloud computing, blockchain technology, artificial intelligence, and machine learning offer soluti...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2024
|
Schriftenreihe: | Advances in web technologies and engineering (AWTE) book series
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-1050 URL des Erstveröffentlichers |
Zusammenfassung: | In the landscape of e-commerce, data security has become a concern as businesses navigate the complexities of sensitive customer information protection and cyber threat mitigation. Strategies involving cloud computing, blockchain technology, artificial intelligence, and machine learning offer solutions to strengthen data security and ensure transactional integrity. Implementing these technologies requires a balance of innovation and efficient security protocols. The development and adoption of security strategies is necessary to positively integrate cutting-edge technologies for effective security in online business.Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning addresses the need for advanced security measures, while examining the current state of e-commerce data security. It explores strategies such as cloud computing, blockchain, artificial intelligence, and machine learning. This book covers topics such as cybersecurity, cloud technology, and forensics, and is a useful resource for computer engineers, business owners, security professionals, government officials, academicians, scientists, and researchers. |
Beschreibung: | 1 Online-Ressource (xxxviii, 657 Seiten) |
DOI: | 10.4018/979-8-3693-6557-1 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049869615 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240917s2024 xx o|||| 00||| eng d | ||
020 | |z 9798369365595 |9 9798369365595 | ||
024 | 7 | |a 10.4018/979-8-3693-6557-1 |2 doi | |
035 | |a (ZDB-98-IGB)00344797 | ||
035 | |a (OCoLC)1466936966 | ||
035 | |a (DE-599)BVBBV049869615 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-1050 | ||
082 | 0 | |a 658.478 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Strategies for e-commerce data security |c Pawan Kumar Goel, editor |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2024 | |
300 | |a 1 Online-Ressource (xxxviii, 657 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in web technologies and engineering (AWTE) book series | |
520 | |a In the landscape of e-commerce, data security has become a concern as businesses navigate the complexities of sensitive customer information protection and cyber threat mitigation. Strategies involving cloud computing, blockchain technology, artificial intelligence, and machine learning offer solutions to strengthen data security and ensure transactional integrity. Implementing these technologies requires a balance of innovation and efficient security protocols. The development and adoption of security strategies is necessary to positively integrate cutting-edge technologies for effective security in online business.Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning addresses the need for advanced security measures, while examining the current state of e-commerce data security. It explores strategies such as cloud computing, blockchain, artificial intelligence, and machine learning. This book covers topics such as cybersecurity, cloud technology, and forensics, and is a useful resource for computer engineers, business owners, security professionals, government officials, academicians, scientists, and researchers. | ||
650 | 4 | |a Artificial intelligence |x Financial applications | |
650 | 4 | |a Blockchains (Databases) |x Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data security | |
650 | 4 | |a Electronic commerce |x Security measures | |
700 | 1 | |a Goel, Pawan Kumar |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9798369365571 |
856 | 4 | 0 | |u https://doi.org/10.4018/979-8-3693-6557-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035209115 | |
966 | e | |u https://doi.org/10.4018/979-8-3693-6557-1 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-6557-1 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715326478548992 |
---|---|
adam_text | |
any_adam_object | |
author2 | Goel, Pawan Kumar |
author2_role | edt |
author2_variant | p k g pk pkg |
author_facet | Goel, Pawan Kumar |
building | Verbundindex |
bvnumber | BV049869615 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00344797 (OCoLC)1466936966 (DE-599)BVBBV049869615 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/979-8-3693-6557-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049869615</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240917s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369365595</subfield><subfield code="9">9798369365595</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-6557-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00344797</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466936966</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049869615</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Strategies for e-commerce data security</subfield><subfield code="c">Pawan Kumar Goel, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxviii, 657 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in web technologies and engineering (AWTE) book series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the landscape of e-commerce, data security has become a concern as businesses navigate the complexities of sensitive customer information protection and cyber threat mitigation. Strategies involving cloud computing, blockchain technology, artificial intelligence, and machine learning offer solutions to strengthen data security and ensure transactional integrity. Implementing these technologies requires a balance of innovation and efficient security protocols. The development and adoption of security strategies is necessary to positively integrate cutting-edge technologies for effective security in online business.Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning addresses the need for advanced security measures, while examining the current state of e-commerce data security. It explores strategies such as cloud computing, blockchain, artificial intelligence, and machine learning. This book covers topics such as cybersecurity, cloud technology, and forensics, and is a useful resource for computer engineers, business owners, security professionals, government officials, academicians, scientists, and researchers.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield><subfield code="x">Financial applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blockchains (Databases)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Pawan Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9798369365571</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/979-8-3693-6557-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035209115</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-6557-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-6557-1</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049869615 |
illustrated | Not Illustrated |
indexdate | 2024-12-17T19:01:35Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035209115 |
oclc_num | 1466936966 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-1050 |
physical | 1 Online-Ressource (xxxviii, 657 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2024 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in web technologies and engineering (AWTE) book series |
spelling | Strategies for e-commerce data security Pawan Kumar Goel, editor Hershey, Pennsylvania IGI Global 2024 1 Online-Ressource (xxxviii, 657 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in web technologies and engineering (AWTE) book series In the landscape of e-commerce, data security has become a concern as businesses navigate the complexities of sensitive customer information protection and cyber threat mitigation. Strategies involving cloud computing, blockchain technology, artificial intelligence, and machine learning offer solutions to strengthen data security and ensure transactional integrity. Implementing these technologies requires a balance of innovation and efficient security protocols. The development and adoption of security strategies is necessary to positively integrate cutting-edge technologies for effective security in online business.Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning addresses the need for advanced security measures, while examining the current state of e-commerce data security. It explores strategies such as cloud computing, blockchain, artificial intelligence, and machine learning. This book covers topics such as cybersecurity, cloud technology, and forensics, and is a useful resource for computer engineers, business owners, security professionals, government officials, academicians, scientists, and researchers. Artificial intelligence Financial applications Blockchains (Databases) Security measures Data encryption (Computer science) Data protection Data security Electronic commerce Security measures Goel, Pawan Kumar edt Erscheint auch als Druck-Ausgabe 9798369365571 https://doi.org/10.4018/979-8-3693-6557-1 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Strategies for e-commerce data security Artificial intelligence Financial applications Blockchains (Databases) Security measures Data encryption (Computer science) Data protection Data security Electronic commerce Security measures |
title | Strategies for e-commerce data security |
title_auth | Strategies for e-commerce data security |
title_exact_search | Strategies for e-commerce data security |
title_full | Strategies for e-commerce data security Pawan Kumar Goel, editor |
title_fullStr | Strategies for e-commerce data security Pawan Kumar Goel, editor |
title_full_unstemmed | Strategies for e-commerce data security Pawan Kumar Goel, editor |
title_short | Strategies for e-commerce data security |
title_sort | strategies for e commerce data security |
topic | Artificial intelligence Financial applications Blockchains (Databases) Security measures Data encryption (Computer science) Data protection Data security Electronic commerce Security measures |
topic_facet | Artificial intelligence Financial applications Blockchains (Databases) Security measures Data encryption (Computer science) Data protection Data security Electronic commerce Security measures |
url | https://doi.org/10.4018/979-8-3693-6557-1 |
work_keys_str_mv | AT goelpawankumar strategiesforecommercedatasecurity |