Cybersecurity and privacy :: bridging the gap /
The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Gistrup :
River Publishers,
©2017.
|
Schriftenreihe: | River Publishers series in communications.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: * Cybersecurity * Encryption * Privacy policy * Trust * Security and Internet of Things * Botnets * Data risks * Cloudbased Services * Visualization. |
Beschreibung: | "Wireless World Research Forum"--Cover |
Beschreibung: | 1 online resource (xxi, 216 pages) : color illustrations |
ISBN: | 9788793519657 8793519656 9781003337812 1003337813 9781000799309 1000799301 9781000799446 1000799441 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1039554285 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 170811s2017 dk a o 001 0 eng | ||
040 | |a AU@ |b eng |e pn |c AU@ |d OCLCO |d OCLCF |d INT |d OCLCQ |d N$T |d OCLCQ |d YDX |d K6U |d ESU |d OCLCQ |d OCLCO |d UPM |d OCLCO |d TYFRS |d UKAHL |d OCLCQ |d SFB |d INARC |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 1159029951 |a 1393056778 | ||
020 | |a 9788793519657 |q (electronic bk.) | ||
020 | |a 8793519656 |q (electronic bk.) | ||
020 | |a 9781003337812 |q (electronic bk.) | ||
020 | |a 1003337813 |q (electronic bk.) | ||
020 | |a 9781000799309 |q (electronic bk. : PDF) | ||
020 | |a 1000799301 |q (electronic bk. : PDF) | ||
020 | |a 9781000799446 |q (electronic bk. : EPUB) | ||
020 | |a 1000799441 |q (electronic bk. : EPUB) | ||
020 | |z 9788793519664 | ||
020 | |z 8793519664 | ||
024 | 7 | |a 10.1201/9781003337812 |2 doi | |
035 | |a (OCoLC)1039554285 |z (OCoLC)1159029951 |z (OCoLC)1393056778 | ||
037 | |a 9781003337812 |b Taylor & Francis | ||
050 | 4 | |a QA76.9.A25 |b C93 2017 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a SCI |x 024000 |2 bisacsh | |
072 | 7 | |a TEC |x 061000 |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Cybersecurity and privacy : |b bridging the gap / |c editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud Erik Skouby. |
260 | |a Gistrup : |b River Publishers, |c ©2017. | ||
300 | |a 1 online resource (xxi, 216 pages) : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a River Publishers series in communications. | |
588 | 0 | |a Print version record. | |
500 | |a "Wireless World Research Forum"--Cover | ||
505 | 0 | 0 | |t An introduction to security challenges in uder-facing cryptographic software / |r Greig Paul ; James Irvine -- |t Take it or leave it effective visualization of privacy policies / |r Prashant S Dhotre ; Anurag Bihani ; Samant Khajuria ; Henning Olesen -- |t A secure channel using social messaging for distributed low-entropy steganography / |r Eckhard Pfluegel ; Charles A. Clarke ; Joakim G. Randulff ; Dimitris Tsaptsinos ; James Orwell -- |t Computational Trust / |r Birger Anderson ; Bipjeet Kaur ; Henrik Tange -- |t Security in internet of things / |r Egon Kidmose ; Jens Myrup Pedersen -- |t Security in the industrial internet of things / |r Aske Hornbeck Knudsen ; Jens Myrup Pedersen ; Mikki Alexander ; Mousing Sorensen ; Theis Dahl Villumsen -- |t Modern and Resilient Cybersecurity the need for principles, collaboration, innovation, education and the occasional application of power / |r Ole Kjeldsen -- |t Building secure data centers for cloud based services a case study / |r Lars Kierkegaard -- |t Pervasive governance understand and secure your transaction data and content / |r Kristoffer Rohde -- |t Challenges of cyber security and a fundamental way to address cyber security / |r Fei Liu ; Marcus Wong. |
520 | |a The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: * Cybersecurity * Encryption * Privacy policy * Trust * Security and Internet of Things * Botnets * Data risks * Cloudbased Services * Visualization. | ||
545 | 0 | |a Samant Khajuria, Lene Sørensen, Knud Erik Skouby | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Privacy, Right of. |0 http://id.loc.gov/authorities/subjects/sh85107029 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a SCIENCE / Energy |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
700 | 1 | |a Khajuria, Samant. |0 http://id.loc.gov/authorities/names/no2018018963 | |
700 | 1 | |a Sørensen, Lene Tolstrup. |0 http://id.loc.gov/authorities/names/no2018018735 | |
700 | 1 | |a Skouby, Knud Erik. |0 http://id.loc.gov/authorities/names/n79137395 | |
710 | 2 | |a Wireless World Research Forum. |0 http://id.loc.gov/authorities/names/nb2004308180 | |
758 | |i has work: |a Cybersecurity and privacy (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGKjFmRYp7C7bVcMHptYRq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Cybersecurity and privacy. |d Gistrup : River Publishers, ©2017 |z 9788793519664 |w (OCoLC)995158802 |
830 | 0 | |a River Publishers series in communications. |0 http://id.loc.gov/authorities/names/no2012038946 | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574 |3 Volltext | |
938 | |a Askews and Holts Library Services |b ASKH |n AH40583899 | ||
938 | |a YBP Library Services |b YANK |n 18105920 | ||
938 | |a EBSCOhost |b EBSC |n 1800574 | ||
938 | |a YBP Library Services |b YANK |n 14658799 | ||
938 | |a Internet Archive |b INAR |n isbn_9788793519664 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1039554285 |
---|---|
_version_ | 1813901619376422912 |
adam_text | |
any_adam_object | |
author2 | Khajuria, Samant Sørensen, Lene Tolstrup Skouby, Knud Erik |
author2_role | |
author2_variant | s k sk l t s lt lts k e s ke kes |
author_GND | http://id.loc.gov/authorities/names/no2018018963 http://id.loc.gov/authorities/names/no2018018735 http://id.loc.gov/authorities/names/n79137395 |
author_additional | Greig Paul ; James Irvine -- Prashant S Dhotre ; Anurag Bihani ; Samant Khajuria ; Henning Olesen -- Eckhard Pfluegel ; Charles A. Clarke ; Joakim G. Randulff ; Dimitris Tsaptsinos ; James Orwell -- Birger Anderson ; Bipjeet Kaur ; Henrik Tange -- Egon Kidmose ; Jens Myrup Pedersen -- Aske Hornbeck Knudsen ; Jens Myrup Pedersen ; Mikki Alexander ; Mousing Sorensen ; Theis Dahl Villumsen -- Ole Kjeldsen -- Lars Kierkegaard -- Kristoffer Rohde -- Fei Liu ; Marcus Wong. |
author_corporate | Wireless World Research Forum |
author_corporate_role | |
author_facet | Khajuria, Samant Sørensen, Lene Tolstrup Skouby, Knud Erik Wireless World Research Forum |
author_sort | Khajuria, Samant |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 C93 2017 |
callnumber-search | QA76.9.A25 C93 2017 |
callnumber-sort | QA 276.9 A25 C93 42017 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | An introduction to security challenges in uder-facing cryptographic software / Take it or leave it effective visualization of privacy policies / A secure channel using social messaging for distributed low-entropy steganography / Computational Trust / Security in internet of things / Security in the industrial internet of things / Modern and Resilient Cybersecurity the need for principles, collaboration, innovation, education and the occasional application of power / Building secure data centers for cloud based services a case study / Pervasive governance understand and secure your transaction data and content / Challenges of cyber security and a fundamental way to address cyber security / |
ctrlnum | (OCoLC)1039554285 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05803cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-on1039554285</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">170811s2017 dk a o 001 0 eng </controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU@</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDX</subfield><subfield code="d">K6U</subfield><subfield code="d">ESU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UPM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TYFRS</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1159029951</subfield><subfield code="a">1393056778</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788793519657</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8793519656</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003337812</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003337813</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000799309</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000799301</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000799446</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000799441</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9788793519664</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">8793519664</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003337812</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1039554285</subfield><subfield code="z">(OCoLC)1159029951</subfield><subfield code="z">(OCoLC)1393056778</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781003337812</subfield><subfield code="b">Taylor & Francis</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C93 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SCI</subfield><subfield code="x">024000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">061000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cybersecurity and privacy :</subfield><subfield code="b">bridging the gap /</subfield><subfield code="c">editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud Erik Skouby.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Gistrup :</subfield><subfield code="b">River Publishers,</subfield><subfield code="c">©2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 216 pages) :</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">River Publishers series in communications.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Wireless World Research Forum"--Cover</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">An introduction to security challenges in uder-facing cryptographic software /</subfield><subfield code="r">Greig Paul ; James Irvine --</subfield><subfield code="t">Take it or leave it effective visualization of privacy policies /</subfield><subfield code="r">Prashant S Dhotre ; Anurag Bihani ; Samant Khajuria ; Henning Olesen --</subfield><subfield code="t">A secure channel using social messaging for distributed low-entropy steganography /</subfield><subfield code="r">Eckhard Pfluegel ; Charles A. Clarke ; Joakim G. Randulff ; Dimitris Tsaptsinos ; James Orwell --</subfield><subfield code="t">Computational Trust /</subfield><subfield code="r">Birger Anderson ; Bipjeet Kaur ; Henrik Tange --</subfield><subfield code="t">Security in internet of things /</subfield><subfield code="r">Egon Kidmose ; Jens Myrup Pedersen --</subfield><subfield code="t">Security in the industrial internet of things /</subfield><subfield code="r">Aske Hornbeck Knudsen ; Jens Myrup Pedersen ; Mikki Alexander ; Mousing Sorensen ; Theis Dahl Villumsen --</subfield><subfield code="t">Modern and Resilient Cybersecurity the need for principles, collaboration, innovation, education and the occasional application of power /</subfield><subfield code="r">Ole Kjeldsen --</subfield><subfield code="t">Building secure data centers for cloud based services a case study /</subfield><subfield code="r">Lars Kierkegaard --</subfield><subfield code="t">Pervasive governance understand and secure your transaction data and content /</subfield><subfield code="r">Kristoffer Rohde --</subfield><subfield code="t">Challenges of cyber security and a fundamental way to address cyber security /</subfield><subfield code="r">Fei Liu ; Marcus Wong.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: * Cybersecurity * Encryption * Privacy policy * Trust * Security and Internet of Things * Botnets * Data risks * Cloudbased Services * Visualization.</subfield></datafield><datafield tag="545" ind1="0" ind2=" "><subfield code="a">Samant Khajuria, Lene Sørensen, Knud Erik Skouby</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85107029</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SCIENCE / Energy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khajuria, Samant.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2018018963</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sørensen, Lene Tolstrup.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2018018735</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skouby, Knud Erik.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n79137395</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Wireless World Research Forum.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2004308180</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cybersecurity and privacy (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGKjFmRYp7C7bVcMHptYRq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Cybersecurity and privacy.</subfield><subfield code="d">Gistrup : River Publishers, ©2017</subfield><subfield code="z">9788793519664</subfield><subfield code="w">(OCoLC)995158802</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">River Publishers series in communications.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2012038946</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH40583899</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">18105920</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1800574</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14658799</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">isbn_9788793519664</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1039554285 |
illustrated | Illustrated |
indexdate | 2024-10-25T15:49:46Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/nb2004308180 |
isbn | 9788793519657 8793519656 9781003337812 1003337813 9781000799309 1000799301 9781000799446 1000799441 |
language | English |
oclc_num | 1039554285 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxi, 216 pages) : color illustrations |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | River Publishers, |
record_format | marc |
series | River Publishers series in communications. |
series2 | River Publishers series in communications. |
spelling | Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud Erik Skouby. Gistrup : River Publishers, ©2017. 1 online resource (xxi, 216 pages) : color illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier River Publishers series in communications. Print version record. "Wireless World Research Forum"--Cover An introduction to security challenges in uder-facing cryptographic software / Greig Paul ; James Irvine -- Take it or leave it effective visualization of privacy policies / Prashant S Dhotre ; Anurag Bihani ; Samant Khajuria ; Henning Olesen -- A secure channel using social messaging for distributed low-entropy steganography / Eckhard Pfluegel ; Charles A. Clarke ; Joakim G. Randulff ; Dimitris Tsaptsinos ; James Orwell -- Computational Trust / Birger Anderson ; Bipjeet Kaur ; Henrik Tange -- Security in internet of things / Egon Kidmose ; Jens Myrup Pedersen -- Security in the industrial internet of things / Aske Hornbeck Knudsen ; Jens Myrup Pedersen ; Mikki Alexander ; Mousing Sorensen ; Theis Dahl Villumsen -- Modern and Resilient Cybersecurity the need for principles, collaboration, innovation, education and the occasional application of power / Ole Kjeldsen -- Building secure data centers for cloud based services a case study / Lars Kierkegaard -- Pervasive governance understand and secure your transaction data and content / Kristoffer Rohde -- Challenges of cyber security and a fundamental way to address cyber security / Fei Liu ; Marcus Wong. The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: * Cybersecurity * Encryption * Privacy policy * Trust * Security and Internet of Things * Botnets * Data risks * Cloudbased Services * Visualization. Samant Khajuria, Lene Sørensen, Knud Erik Skouby Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Security General. bisacsh SCIENCE / Energy bisacsh Computer security fast Privacy, Right of fast Khajuria, Samant. http://id.loc.gov/authorities/names/no2018018963 Sørensen, Lene Tolstrup. http://id.loc.gov/authorities/names/no2018018735 Skouby, Knud Erik. http://id.loc.gov/authorities/names/n79137395 Wireless World Research Forum. http://id.loc.gov/authorities/names/nb2004308180 has work: Cybersecurity and privacy (Text) https://id.oclc.org/worldcat/entity/E39PCGKjFmRYp7C7bVcMHptYRq https://id.oclc.org/worldcat/ontology/hasWork Print version: Cybersecurity and privacy. Gistrup : River Publishers, ©2017 9788793519664 (OCoLC)995158802 River Publishers series in communications. http://id.loc.gov/authorities/names/no2012038946 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574 Volltext |
spellingShingle | Cybersecurity and privacy : bridging the gap / River Publishers series in communications. An introduction to security challenges in uder-facing cryptographic software / Take it or leave it effective visualization of privacy policies / A secure channel using social messaging for distributed low-entropy steganography / Computational Trust / Security in internet of things / Security in the industrial internet of things / Modern and Resilient Cybersecurity the need for principles, collaboration, innovation, education and the occasional application of power / Building secure data centers for cloud based services a case study / Pervasive governance understand and secure your transaction data and content / Challenges of cyber security and a fundamental way to address cyber security / Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Security General. bisacsh SCIENCE / Energy bisacsh Computer security fast Privacy, Right of fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh85107029 https://id.nlm.nih.gov/mesh/D016494 |
title | Cybersecurity and privacy : bridging the gap / |
title_alt | An introduction to security challenges in uder-facing cryptographic software / Take it or leave it effective visualization of privacy policies / A secure channel using social messaging for distributed low-entropy steganography / Computational Trust / Security in internet of things / Security in the industrial internet of things / Modern and Resilient Cybersecurity the need for principles, collaboration, innovation, education and the occasional application of power / Building secure data centers for cloud based services a case study / Pervasive governance understand and secure your transaction data and content / Challenges of cyber security and a fundamental way to address cyber security / |
title_auth | Cybersecurity and privacy : bridging the gap / |
title_exact_search | Cybersecurity and privacy : bridging the gap / |
title_full | Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud Erik Skouby. |
title_fullStr | Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud Erik Skouby. |
title_full_unstemmed | Cybersecurity and privacy : bridging the gap / editors, Samant Khajuria, Lene Tolstrup Sørensen, Knud Erik Skouby. |
title_short | Cybersecurity and privacy : |
title_sort | cybersecurity and privacy bridging the gap |
title_sub | bridging the gap / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Security General. bisacsh SCIENCE / Energy bisacsh Computer security fast Privacy, Right of fast |
topic_facet | Computer security. Privacy, Right of. Computer Security Sécurité informatique. COMPUTERS Security General. SCIENCE / Energy Computer security Privacy, Right of |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800574 |
work_keys_str_mv | AT khajuriasamant cybersecurityandprivacybridgingthegap AT sørensenlenetolstrup cybersecurityandprivacybridgingthegap AT skoubyknuderik cybersecurityandprivacybridgingthegap AT wirelessworldresearchforum cybersecurityandprivacybridgingthegap |