Cyber minds :: insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe /
With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safet...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2020.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781789805680 1789805686 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1160207380 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 200630s2020 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d YDX |d N$T |d YDXIT |d EBLCP |d OCLCF |d OCL |d OCLCO |d ESU |d NLW |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d HOPLA | ||
019 | |a 1136966982 |a 1136967244 | ||
020 | |a 9781789805680 | ||
020 | |a 1789805686 | ||
020 | |z 9781789807004 | ||
035 | |a (OCoLC)1160207380 |z (OCoLC)1136966982 |z (OCoLC)1136967244 | ||
037 | |a CL0501000120 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Rubinoff, Shira, |e author. | |
245 | 1 | 0 | |a Cyber minds : |b insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / |c Shira Rubinoff. |
246 | 3 | 0 | |a Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2020. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed June 25, 2020). | |
500 | |a Includes index. | ||
520 | |a With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety. | ||
505 | 0 | |a Cyber minds: insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe -- About the author -- Table of Contents -- Preface -- Chapter 1: Integrating Humans and Technology -- Four Steps to Cyber Hygiene -- Chapter 2: How Risky Behavior Leads to Data Breaches -- Chapter 3: Blockchain -- The Unwritten Chapter on Cybersecurity -- Chapter 4: Cybersecurity in the Cloud -- What You Need to Know -- Chapter 5: The World's Biggest Data Breaches -- Proactive and Reactive Approaches -- Chapter 6: Trends in Cybersecurity -- Chapter 7: Staying Cybersecure in the IoT Revolution -- Chapter 8: Cyberwars -- Bringing Military Lessons to Modern Information Security -- Chapter 9: Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity? -- Chapter 10: Conclusion -- Other Books You May Enjoy -- Index. | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Cloud computing. |0 http://id.loc.gov/authorities/subjects/sh2008004883 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Infonuagique. | |
650 | 7 | |a Ethical & social aspects of IT. |2 bicssc | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Information technology: general issues. |2 bicssc | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Social Aspects |x General. |2 bisacsh | |
650 | 7 | |a Computers |x General. |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
758 | |i has work: |a Cyber Minds (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXXCFvcgdtWBMkmMM6pCW8 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Rubinoff, Shira. |t Cyber Minds : Insights on Cybersecurity Across the Cloud, Data, Artificial Intelligence, Blockchain, and IoT to Keep You Cyber Safe. |d Birmingham : Packt Publishing, Limited, ©2020 |z 9781789807004 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2353839 |3 Volltext |
938 | |a hoopla Digital |b HOPL |n MWT15356796 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6020320 | ||
938 | |a EBSCOhost |b EBSC |n 2353839 | ||
938 | |a YBP Library Services |b YANK |n 301053468 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1160207380 |
---|---|
_version_ | 1816882520970493952 |
adam_text | |
any_adam_object | |
author | Rubinoff, Shira |
author_facet | Rubinoff, Shira |
author_role | aut |
author_sort | Rubinoff, Shira |
author_variant | s r sr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cyber minds: insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe -- About the author -- Table of Contents -- Preface -- Chapter 1: Integrating Humans and Technology -- Four Steps to Cyber Hygiene -- Chapter 2: How Risky Behavior Leads to Data Breaches -- Chapter 3: Blockchain -- The Unwritten Chapter on Cybersecurity -- Chapter 4: Cybersecurity in the Cloud -- What You Need to Know -- Chapter 5: The World's Biggest Data Breaches -- Proactive and Reactive Approaches -- Chapter 6: Trends in Cybersecurity -- Chapter 7: Staying Cybersecure in the IoT Revolution -- Chapter 8: Cyberwars -- Bringing Military Lessons to Modern Information Security -- Chapter 9: Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity? -- Chapter 10: Conclusion -- Other Books You May Enjoy -- Index. |
ctrlnum | (OCoLC)1160207380 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04380cam a2200685 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1160207380</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">200630s2020 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXIT</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ESU</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">HOPLA</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1136966982</subfield><subfield code="a">1136967244</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789805680</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789805686</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781789807004</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1160207380</subfield><subfield code="z">(OCoLC)1136966982</subfield><subfield code="z">(OCoLC)1136967244</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0501000120</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rubinoff, Shira,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber minds :</subfield><subfield code="b">insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe /</subfield><subfield code="c">Shira Rubinoff.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed June 25, 2020).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cyber minds: insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe -- About the author -- Table of Contents -- Preface -- Chapter 1: Integrating Humans and Technology -- Four Steps to Cyber Hygiene -- Chapter 2: How Risky Behavior Leads to Data Breaches -- Chapter 3: Blockchain -- The Unwritten Chapter on Cybersecurity -- Chapter 4: Cybersecurity in the Cloud -- What You Need to Know -- Chapter 5: The World's Biggest Data Breaches -- Proactive and Reactive Approaches -- Chapter 6: Trends in Cybersecurity -- Chapter 7: Staying Cybersecure in the IoT Revolution -- Chapter 8: Cyberwars -- Bringing Military Lessons to Modern Information Security -- Chapter 9: Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity? -- Chapter 10: Conclusion -- Other Books You May Enjoy -- Index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2008004883</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ethical & social aspects of IT.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology: general issues.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Social Aspects</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber Minds (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXXCFvcgdtWBMkmMM6pCW8</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rubinoff, Shira.</subfield><subfield code="t">Cyber Minds : Insights on Cybersecurity Across the Cloud, Data, Artificial Intelligence, Blockchain, and IoT to Keep You Cyber Safe.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2020</subfield><subfield code="z">9781789807004</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2353839</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">hoopla Digital</subfield><subfield code="b">HOPL</subfield><subfield code="n">MWT15356796</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6020320</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2353839</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301053468</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1160207380 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:29:56Z |
institution | BVB |
isbn | 9781789805680 1789805686 |
language | English |
oclc_num | 1160207380 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Rubinoff, Shira, author. Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / Shira Rubinoff. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe Birmingham, UK : Packt Publishing, 2020. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from title page (Safari, viewed June 25, 2020). Includes index. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety. Cyber minds: insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe -- About the author -- Table of Contents -- Preface -- Chapter 1: Integrating Humans and Technology -- Four Steps to Cyber Hygiene -- Chapter 2: How Risky Behavior Leads to Data Breaches -- Chapter 3: Blockchain -- The Unwritten Chapter on Cybersecurity -- Chapter 4: Cybersecurity in the Cloud -- What You Need to Know -- Chapter 5: The World's Biggest Data Breaches -- Proactive and Reactive Approaches -- Chapter 6: Trends in Cybersecurity -- Chapter 7: Staying Cybersecure in the IoT Revolution -- Chapter 8: Cyberwars -- Bringing Military Lessons to Modern Information Security -- Chapter 9: Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity? -- Chapter 10: Conclusion -- Other Books You May Enjoy -- Index. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Internet Security measures. Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Internet Sécurité Mesures. Infonuagique. Ethical & social aspects of IT. bicssc Computer security. bicssc Information technology: general issues. bicssc Computers Security General. bisacsh Computers Social Aspects General. bisacsh Computers General. bisacsh Cloud computing fast Computer networks Security measures fast Computer security fast Internet Security measures fast has work: Cyber Minds (Text) https://id.oclc.org/worldcat/entity/E39PCXXCFvcgdtWBMkmMM6pCW8 https://id.oclc.org/worldcat/ontology/hasWork Print version: Rubinoff, Shira. Cyber Minds : Insights on Cybersecurity Across the Cloud, Data, Artificial Intelligence, Blockchain, and IoT to Keep You Cyber Safe. Birmingham : Packt Publishing, Limited, ©2020 9781789807004 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2353839 Volltext |
spellingShingle | Rubinoff, Shira Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / Cyber minds: insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe -- About the author -- Table of Contents -- Preface -- Chapter 1: Integrating Humans and Technology -- Four Steps to Cyber Hygiene -- Chapter 2: How Risky Behavior Leads to Data Breaches -- Chapter 3: Blockchain -- The Unwritten Chapter on Cybersecurity -- Chapter 4: Cybersecurity in the Cloud -- What You Need to Know -- Chapter 5: The World's Biggest Data Breaches -- Proactive and Reactive Approaches -- Chapter 6: Trends in Cybersecurity -- Chapter 7: Staying Cybersecure in the IoT Revolution -- Chapter 8: Cyberwars -- Bringing Military Lessons to Modern Information Security -- Chapter 9: Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity? -- Chapter 10: Conclusion -- Other Books You May Enjoy -- Index. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Internet Security measures. Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Internet Sécurité Mesures. Infonuagique. Ethical & social aspects of IT. bicssc Computer security. bicssc Information technology: general issues. bicssc Computers Security General. bisacsh Computers Social Aspects General. bisacsh Computers General. bisacsh Cloud computing fast Computer networks Security measures fast Computer security fast Internet Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh2008004883 https://id.nlm.nih.gov/mesh/D016494 |
title | Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / |
title_alt | Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe |
title_auth | Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / |
title_exact_search | Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / |
title_full | Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / Shira Rubinoff. |
title_fullStr | Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / Shira Rubinoff. |
title_full_unstemmed | Cyber minds : insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / Shira Rubinoff. |
title_short | Cyber minds : |
title_sort | cyber minds insights on cybersecurity across the cloud data artificial intelligence blockchain and iot to keep you cyber safe |
title_sub | insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Internet Security measures. Cloud computing. http://id.loc.gov/authorities/subjects/sh2008004883 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Internet Sécurité Mesures. Infonuagique. Ethical & social aspects of IT. bicssc Computer security. bicssc Information technology: general issues. bicssc Computers Security General. bisacsh Computers Social Aspects General. bisacsh Computers General. bisacsh Cloud computing fast Computer networks Security measures fast Computer security fast Internet Security measures fast |
topic_facet | Computer security. Computer networks Security measures. Internet Security measures. Cloud computing. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Internet Sécurité Mesures. Infonuagique. Ethical & social aspects of IT. Information technology: general issues. Computers Security General. Computers Social Aspects General. Computers General. Cloud computing Computer networks Security measures Computer security Internet Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2353839 |
work_keys_str_mv | AT rubinoffshira cybermindsinsightsoncybersecurityacrosstheclouddataartificialintelligenceblockchainandiottokeepyoucybersafe AT rubinoffshira insightsoncybersecurityacrosstheclouddataartificialintelligenceblockchainandiottokeepyoucybersafe |