Handbook of research on information and cyber security in the fourth industrial revolution:
"This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrori...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrorism, cybersecurity trends, cyber offensive and defensive capability, digital forensics, cloud security, mobile security"-- |
Beschreibung: | 30 PDFs (xxvi, 647 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522547648 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00185479 | ||
003 | IGIG | ||
005 | 20180529084539.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 180530s2018 pau fob 001 0 eng d | ||
010 | |z 2017032400 | ||
020 | |a 9781522547648 |q ebook | ||
020 | |z 9781522547631 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-4763-1 |2 doi | |
035 | |a (CaBNVSL)slc19771396 | ||
035 | |a (OCoLC)1038282104 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .P744 2018e | |
082 | 7 | |a 658.4/78 |2 23 | |
245 | 0 | 0 | |a Handbook of research on information and cyber security in the fourth industrial revolution |c Ziska Fields, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2018] | |
300 | |a 30 PDFs (xxvi, 647 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Social engineering in information security breaches and the factors that explain its success: an organizational perspective -- Chapter 2. Safe distances: online and RL hyper-personal relationships as potential attack surfaces -- Chapter 3. Ransomware: the cyber extortionist -- Chapter 4. Curtailing the threats to cloud computing in the fourth industrial revolution -- Chapter 5. The impact of IoT on information warfare -- Chapter 6. A generic self-evolving multi-agent defense approach against cyber attacks -- Chapter 7. The different aspects of information security education -- Chapter 8. Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment -- Chapter 9. Dynamic risk assessment in IT environments: a decision guide -- Chapter 10. Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online -- Chapter 11. Cyber resilience for the internet of things -- Chapter 12. Developing cybersecurity resilience in the provincial government -- Chapter 13. Government's dynamic approach to addressing challenges of cybersecurity in South Africa -- Chapter 14. Information security management: a South African public sector perspective -- Chapter 15. Inducing six-word stories from curated text sets to anticipate cyberwar in 4IR -- Chapter 16. Terrorism in the age of information: unpuzzling the connection of terrorism and the media in the fourth industrial revolution -- Chapter 17. Cybersecurity risks and automated maritime container terminals in the age of 4IR -- Chapter 18. Cyber security education in the fourth industrial revolution: the case of South Africa -- Chapter 19. Mobile device brand loyalty of youth: perceived value vs. cybersecurity choices -- Chapter 20. Mobile security in low-income households' businesses: a measure of financial inclusion. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrorism, cybersecurity trends, cyber offensive and defensive capability, digital forensics, cloud security, mobile security"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 05/30/2018). | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Confidential communications |x Protection. | |
650 | 0 | |a Electronic information resources |x Access control. | |
700 | 1 | |a Fields, Ziska |d 1970- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017032400 | |
776 | 0 | 8 | |i Print version: |z 1522547630 |z 9781522547631 |w (DLC) 2017032400 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4763-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00185479 |
---|---|
_version_ | 1804751456238043136 |
adam_text | |
any_adam_object | |
author2 | Fields, Ziska 1970- |
author2_role | edt |
author2_variant | z f zf |
author_facet | Fields, Ziska 1970- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .P744 2018e |
callnumber-search | TK5105.59 .P744 2018e |
callnumber-sort | TK 45105.59 P744 42018E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Social engineering in information security breaches and the factors that explain its success: an organizational perspective -- Chapter 2. Safe distances: online and RL hyper-personal relationships as potential attack surfaces -- Chapter 3. Ransomware: the cyber extortionist -- Chapter 4. Curtailing the threats to cloud computing in the fourth industrial revolution -- Chapter 5. The impact of IoT on information warfare -- Chapter 6. A generic self-evolving multi-agent defense approach against cyber attacks -- Chapter 7. The different aspects of information security education -- Chapter 8. Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment -- Chapter 9. Dynamic risk assessment in IT environments: a decision guide -- Chapter 10. Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online -- Chapter 11. Cyber resilience for the internet of things -- Chapter 12. Developing cybersecurity resilience in the provincial government -- Chapter 13. Government's dynamic approach to addressing challenges of cybersecurity in South Africa -- Chapter 14. Information security management: a South African public sector perspective -- Chapter 15. Inducing six-word stories from curated text sets to anticipate cyberwar in 4IR -- Chapter 16. Terrorism in the age of information: unpuzzling the connection of terrorism and the media in the fourth industrial revolution -- Chapter 17. Cybersecurity risks and automated maritime container terminals in the age of 4IR -- Chapter 18. Cyber security education in the fourth industrial revolution: the case of South Africa -- Chapter 19. Mobile device brand loyalty of youth: perceived value vs. cybersecurity choices -- Chapter 20. Mobile security in low-income households' businesses: a measure of financial inclusion. |
ctrlnum | (CaBNVSL)slc19771396 (OCoLC)1038282104 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04147nam a2200469 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00185479</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20180529084539.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">180530s2018 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017032400</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522547648</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522547631</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-4763-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc19771396</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1038282104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.P744 2018e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on information and cyber security in the fourth industrial revolution </subfield><subfield code="c">Ziska Fields, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">30 PDFs (xxvi, 647 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Social engineering in information security breaches and the factors that explain its success: an organizational perspective -- Chapter 2. Safe distances: online and RL hyper-personal relationships as potential attack surfaces -- Chapter 3. Ransomware: the cyber extortionist -- Chapter 4. Curtailing the threats to cloud computing in the fourth industrial revolution -- Chapter 5. The impact of IoT on information warfare -- Chapter 6. A generic self-evolving multi-agent defense approach against cyber attacks -- Chapter 7. The different aspects of information security education -- Chapter 8. Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment -- Chapter 9. Dynamic risk assessment in IT environments: a decision guide -- Chapter 10. Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online -- Chapter 11. Cyber resilience for the internet of things -- Chapter 12. Developing cybersecurity resilience in the provincial government -- Chapter 13. Government's dynamic approach to addressing challenges of cybersecurity in South Africa -- Chapter 14. Information security management: a South African public sector perspective -- Chapter 15. Inducing six-word stories from curated text sets to anticipate cyberwar in 4IR -- Chapter 16. Terrorism in the age of information: unpuzzling the connection of terrorism and the media in the fourth industrial revolution -- Chapter 17. Cybersecurity risks and automated maritime container terminals in the age of 4IR -- Chapter 18. Cyber security education in the fourth industrial revolution: the case of South Africa -- Chapter 19. Mobile device brand loyalty of youth: perceived value vs. cybersecurity choices -- Chapter 20. Mobile security in low-income households' businesses: a measure of financial inclusion.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrorism, cybersecurity trends, cyber offensive and defensive capability, digital forensics, cloud security, mobile security"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/30/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications</subfield><subfield code="x">Protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fields, Ziska</subfield><subfield code="d">1970-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017032400</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522547630</subfield><subfield code="z">9781522547631</subfield><subfield code="w">(DLC) 2017032400</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4763-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00185479 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:51Z |
institution | BVB |
isbn | 9781522547648 |
language | English |
oclc_num | 1038282104 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 30 PDFs (xxvi, 647 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on information and cyber security in the fourth industrial revolution Ziska Fields, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018] 30 PDFs (xxvi, 647 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Social engineering in information security breaches and the factors that explain its success: an organizational perspective -- Chapter 2. Safe distances: online and RL hyper-personal relationships as potential attack surfaces -- Chapter 3. Ransomware: the cyber extortionist -- Chapter 4. Curtailing the threats to cloud computing in the fourth industrial revolution -- Chapter 5. The impact of IoT on information warfare -- Chapter 6. A generic self-evolving multi-agent defense approach against cyber attacks -- Chapter 7. The different aspects of information security education -- Chapter 8. Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment -- Chapter 9. Dynamic risk assessment in IT environments: a decision guide -- Chapter 10. Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online -- Chapter 11. Cyber resilience for the internet of things -- Chapter 12. Developing cybersecurity resilience in the provincial government -- Chapter 13. Government's dynamic approach to addressing challenges of cybersecurity in South Africa -- Chapter 14. Information security management: a South African public sector perspective -- Chapter 15. Inducing six-word stories from curated text sets to anticipate cyberwar in 4IR -- Chapter 16. Terrorism in the age of information: unpuzzling the connection of terrorism and the media in the fourth industrial revolution -- Chapter 17. Cybersecurity risks and automated maritime container terminals in the age of 4IR -- Chapter 18. Cyber security education in the fourth industrial revolution: the case of South Africa -- Chapter 19. Mobile device brand loyalty of youth: perceived value vs. cybersecurity choices -- Chapter 20. Mobile security in low-income households' businesses: a measure of financial inclusion. Restricted to subscribers or individual electronic text purchasers. "This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrorism, cybersecurity trends, cyber offensive and defensive capability, digital forensics, cloud security, mobile security"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/30/2018). Computer crimes Prevention. Computer networks Security measures. Confidential communications Protection. Electronic information resources Access control. Fields, Ziska 1970- editor. IGI Global, publisher. (Original) (DLC)2017032400 Print version: 1522547630 9781522547631 (DLC) 2017032400 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4763-1 Volltext |
spellingShingle | Handbook of research on information and cyber security in the fourth industrial revolution Chapter 1. Social engineering in information security breaches and the factors that explain its success: an organizational perspective -- Chapter 2. Safe distances: online and RL hyper-personal relationships as potential attack surfaces -- Chapter 3. Ransomware: the cyber extortionist -- Chapter 4. Curtailing the threats to cloud computing in the fourth industrial revolution -- Chapter 5. The impact of IoT on information warfare -- Chapter 6. A generic self-evolving multi-agent defense approach against cyber attacks -- Chapter 7. The different aspects of information security education -- Chapter 8. Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment -- Chapter 9. Dynamic risk assessment in IT environments: a decision guide -- Chapter 10. Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online -- Chapter 11. Cyber resilience for the internet of things -- Chapter 12. Developing cybersecurity resilience in the provincial government -- Chapter 13. Government's dynamic approach to addressing challenges of cybersecurity in South Africa -- Chapter 14. Information security management: a South African public sector perspective -- Chapter 15. Inducing six-word stories from curated text sets to anticipate cyberwar in 4IR -- Chapter 16. Terrorism in the age of information: unpuzzling the connection of terrorism and the media in the fourth industrial revolution -- Chapter 17. Cybersecurity risks and automated maritime container terminals in the age of 4IR -- Chapter 18. Cyber security education in the fourth industrial revolution: the case of South Africa -- Chapter 19. Mobile device brand loyalty of youth: perceived value vs. cybersecurity choices -- Chapter 20. Mobile security in low-income households' businesses: a measure of financial inclusion. Computer crimes Prevention. Computer networks Security measures. Confidential communications Protection. Electronic information resources Access control. |
title | Handbook of research on information and cyber security in the fourth industrial revolution |
title_auth | Handbook of research on information and cyber security in the fourth industrial revolution |
title_exact_search | Handbook of research on information and cyber security in the fourth industrial revolution |
title_full | Handbook of research on information and cyber security in the fourth industrial revolution Ziska Fields, editor. |
title_fullStr | Handbook of research on information and cyber security in the fourth industrial revolution Ziska Fields, editor. |
title_full_unstemmed | Handbook of research on information and cyber security in the fourth industrial revolution Ziska Fields, editor. |
title_short | Handbook of research on information and cyber security in the fourth industrial revolution |
title_sort | handbook of research on information and cyber security in the fourth industrial revolution |
topic | Computer crimes Prevention. Computer networks Security measures. Confidential communications Protection. Electronic information resources Access control. |
topic_facet | Computer crimes Prevention. Computer networks Security measures. Confidential communications Protection. Electronic information resources Access control. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4763-1 |
work_keys_str_mv | AT fieldsziska handbookofresearchoninformationandcybersecurityinthefourthindustrialrevolution AT igiglobal handbookofresearchoninformationandcybersecurityinthefourthindustrialrevolution |