Cybersecurity measures for E-government frameworks:
"This book covers security issues that must be considered for E-governance applications, by helping and protecting them from possible cybersecurity attacks to alleviate the fraud potential as hackers use emerging technologies for cyber-attacks."
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2022.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book covers security issues that must be considered for E-governance applications, by helping and protecting them from possible cybersecurity attacks to alleviate the fraud potential as hackers use emerging technologies for cyber-attacks." |
Beschreibung: | 23 PDFs (280 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799896265 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00279863 | ||
003 | IGIG | ||
005 | 20220519134413.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 220520s2022 pau fob 001 0 eng d | ||
020 | |a 9781799896265 |q PDF | ||
020 | |z 1799896269 | ||
020 | |z 9781799896241 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-7998-9624-1 |2 doi | |
035 | |a (CaBNVSL)slc00002612 | ||
035 | |a (OCoLC)1296949351 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a JF1525.A8 |b C96 2022eb | |
082 | 7 | |a 351.02854678 |2 23 | |
245 | 0 | 0 | |a Cybersecurity measures for E-government frameworks |c Jhanjhi Noor Zaman, Imdad Ali Shah, and Samina Rajper, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2022. | |
300 | |a 23 PDFs (280 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. E-government cybersecurity modeling in the context of software-defined networks -- Chapter 2. E-government privacy and security challenges in the context of Internet of Things -- Chapter 3. Emerging cybersecurity threats in the eye of e-governance in the current era -- Chapter 4. E-government security and privacy issues: challenges and preventive approaches -- Chapter 5. The influence of cybersecurity attacks on e-governance -- Chapter 6. Argument for improved security in local governments within the economic community of West African States -- Chapter 7. The influence of deep learning in detecting cyber attacks on e-government applications -- Chapter 8. The impact of cyber attacks on e-governance during the COVID-19 pandemic -- Chapter 9. The consequences of integrity attacks on e-governance: privacy and security violation -- Chapter 10. The impact of blockchain technology on advanced security measures for e-government -- Chapter 11. Applying decision tree for hiding data in binary images for secure and secret information flow -- Chapter 12. Cybersecurity issues and challenges for e-government during COVID-19: a review. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book covers security issues that must be considered for E-governance applications, by helping and protecting them from possible cybersecurity attacks to alleviate the fraud potential as hackers use emerging technologies for cyber-attacks." | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 05/20/2022). | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Internet in public administration |x Security measures. | |
700 | 1 | |a Rajper, Samina, |e editor. | |
700 | 1 | |a Shah, Imdad Ali, |e editor. | |
700 | 1 | |a Zaman, Noor, |e editor | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1799896242 |z 9781799896241 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-9624-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00279863 |
---|---|
_version_ | 1804751463811907584 |
adam_text | |
any_adam_object | |
author2 | Rajper, Samina Shah, Imdad Ali Zaman, Noor |
author2_role | edt edt edt |
author2_variant | s r sr i a s ia ias n z nz |
author_facet | Rajper, Samina Shah, Imdad Ali Zaman, Noor |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | J - Political Science |
callnumber-label | JF1525 |
callnumber-raw | JF1525.A8 C96 2022eb |
callnumber-search | JF1525.A8 C96 2022eb |
callnumber-sort | JF 41525 A8 C96 42022EB |
callnumber-subject | JF - Public Administration |
collection | ZDB-98-IGB |
contents | Chapter 1. E-government cybersecurity modeling in the context of software-defined networks -- Chapter 2. E-government privacy and security challenges in the context of Internet of Things -- Chapter 3. Emerging cybersecurity threats in the eye of e-governance in the current era -- Chapter 4. E-government security and privacy issues: challenges and preventive approaches -- Chapter 5. The influence of cybersecurity attacks on e-governance -- Chapter 6. Argument for improved security in local governments within the economic community of West African States -- Chapter 7. The influence of deep learning in detecting cyber attacks on e-government applications -- Chapter 8. The impact of cyber attacks on e-governance during the COVID-19 pandemic -- Chapter 9. The consequences of integrity attacks on e-governance: privacy and security violation -- Chapter 10. The impact of blockchain technology on advanced security measures for e-government -- Chapter 11. Applying decision tree for hiding data in binary images for secure and secret information flow -- Chapter 12. Cybersecurity issues and challenges for e-government during COVID-19: a review. |
ctrlnum | (CaBNVSL)slc00002612 (OCoLC)1296949351 |
dewey-full | 351.02854678 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 351 - Public administration |
dewey-raw | 351.02854678 |
dewey-search | 351.02854678 |
dewey-sort | 3351.02854678 |
dewey-tens | 350 - Public administration and military science |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03124nam a2200457 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00279863</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20220519134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">220520s2022 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799896265</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1799896269</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799896241</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-9624-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00002612</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1296949351</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JF1525.A8</subfield><subfield code="b">C96 2022eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">351.02854678</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cybersecurity measures for E-government frameworks </subfield><subfield code="c">Jhanjhi Noor Zaman, Imdad Ali Shah, and Samina Rajper, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">23 PDFs (280 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. E-government cybersecurity modeling in the context of software-defined networks -- Chapter 2. E-government privacy and security challenges in the context of Internet of Things -- Chapter 3. Emerging cybersecurity threats in the eye of e-governance in the current era -- Chapter 4. E-government security and privacy issues: challenges and preventive approaches -- Chapter 5. The influence of cybersecurity attacks on e-governance -- Chapter 6. Argument for improved security in local governments within the economic community of West African States -- Chapter 7. The influence of deep learning in detecting cyber attacks on e-government applications -- Chapter 8. The impact of cyber attacks on e-governance during the COVID-19 pandemic -- Chapter 9. The consequences of integrity attacks on e-governance: privacy and security violation -- Chapter 10. The impact of blockchain technology on advanced security measures for e-government -- Chapter 11. Applying decision tree for hiding data in binary images for secure and secret information flow -- Chapter 12. Cybersecurity issues and challenges for e-government during COVID-19: a review.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book covers security issues that must be considered for E-governance applications, by helping and protecting them from possible cybersecurity attacks to alleviate the fraud potential as hackers use emerging technologies for cyber-attacks."</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/20/2022).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet in public administration</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rajper, Samina,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shah, Imdad Ali,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zaman, Noor,</subfield><subfield code="e">editor</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799896242</subfield><subfield code="z">9781799896241</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-9624-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00279863 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:58Z |
institution | BVB |
isbn | 9781799896265 |
language | English |
oclc_num | 1296949351 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 23 PDFs (280 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global, |
record_format | marc |
spelling | Cybersecurity measures for E-government frameworks Jhanjhi Noor Zaman, Imdad Ali Shah, and Samina Rajper, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2022. 23 PDFs (280 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. E-government cybersecurity modeling in the context of software-defined networks -- Chapter 2. E-government privacy and security challenges in the context of Internet of Things -- Chapter 3. Emerging cybersecurity threats in the eye of e-governance in the current era -- Chapter 4. E-government security and privacy issues: challenges and preventive approaches -- Chapter 5. The influence of cybersecurity attacks on e-governance -- Chapter 6. Argument for improved security in local governments within the economic community of West African States -- Chapter 7. The influence of deep learning in detecting cyber attacks on e-government applications -- Chapter 8. The impact of cyber attacks on e-governance during the COVID-19 pandemic -- Chapter 9. The consequences of integrity attacks on e-governance: privacy and security violation -- Chapter 10. The impact of blockchain technology on advanced security measures for e-government -- Chapter 11. Applying decision tree for hiding data in binary images for secure and secret information flow -- Chapter 12. Cybersecurity issues and challenges for e-government during COVID-19: a review. Restricted to subscribers or individual electronic text purchasers. "This book covers security issues that must be considered for E-governance applications, by helping and protecting them from possible cybersecurity attacks to alleviate the fraud potential as hackers use emerging technologies for cyber-attacks." Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/20/2022). Computer security. Internet in public administration Security measures. Rajper, Samina, editor. Shah, Imdad Ali, editor. Zaman, Noor, editor IGI Global, publisher. Print version: 1799896242 9781799896241 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-9624-1 Volltext |
spellingShingle | Cybersecurity measures for E-government frameworks Chapter 1. E-government cybersecurity modeling in the context of software-defined networks -- Chapter 2. E-government privacy and security challenges in the context of Internet of Things -- Chapter 3. Emerging cybersecurity threats in the eye of e-governance in the current era -- Chapter 4. E-government security and privacy issues: challenges and preventive approaches -- Chapter 5. The influence of cybersecurity attacks on e-governance -- Chapter 6. Argument for improved security in local governments within the economic community of West African States -- Chapter 7. The influence of deep learning in detecting cyber attacks on e-government applications -- Chapter 8. The impact of cyber attacks on e-governance during the COVID-19 pandemic -- Chapter 9. The consequences of integrity attacks on e-governance: privacy and security violation -- Chapter 10. The impact of blockchain technology on advanced security measures for e-government -- Chapter 11. Applying decision tree for hiding data in binary images for secure and secret information flow -- Chapter 12. Cybersecurity issues and challenges for e-government during COVID-19: a review. Computer security. Internet in public administration Security measures. |
title | Cybersecurity measures for E-government frameworks |
title_auth | Cybersecurity measures for E-government frameworks |
title_exact_search | Cybersecurity measures for E-government frameworks |
title_full | Cybersecurity measures for E-government frameworks Jhanjhi Noor Zaman, Imdad Ali Shah, and Samina Rajper, editors. |
title_fullStr | Cybersecurity measures for E-government frameworks Jhanjhi Noor Zaman, Imdad Ali Shah, and Samina Rajper, editors. |
title_full_unstemmed | Cybersecurity measures for E-government frameworks Jhanjhi Noor Zaman, Imdad Ali Shah, and Samina Rajper, editors. |
title_short | Cybersecurity measures for E-government frameworks |
title_sort | cybersecurity measures for e government frameworks |
topic | Computer security. Internet in public administration Security measures. |
topic_facet | Computer security. Internet in public administration Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-9624-1 |
work_keys_str_mv | AT rajpersamina cybersecuritymeasuresforegovernmentframeworks AT shahimdadali cybersecuritymeasuresforegovernmentframeworks AT zamannoor cybersecuritymeasuresforegovernmentframeworks AT igiglobal cybersecuritymeasuresforegovernmentframeworks |