Cross-industry applications of cyber security frameworks:
"This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology l...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2022.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape." |
Beschreibung: | 19 PDFs (244 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781668434505 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00284479 | ||
003 | IGIG | ||
005 | 20220629134413.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 220630s2022 pau fob 001 0 eng d | ||
020 | |a 9781668434505 |q PDF | ||
020 | |z 1668434482 |q hardcover | ||
020 | |z 1668434490 | ||
020 | |z 9781668434482 |q hardcover | ||
020 | |z 9781668434499 |q softcover | ||
024 | 7 | |a 10.4018/978-1-6684-3448-2 |2 doi | |
035 | |a (CaBNVSL)slc00002872 | ||
035 | |a (OCoLC)1322059921 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .C73 2022eb | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Cross-industry applications of cyber security frameworks |c Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2022. | |
300 | |a 19 PDFs (244 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Cyber security trend analysis: an Indian perspective -- Chapter 2. Role of artificial intelligence on cybersecurity and its control -- Chapter 3. Analysis and mitigation strategies of security issues of software-defined networks -- Chapter 4. Role of Bangladesh bank on cybersecurity in FinTech -- Chapter 5. Cyber security legal framework in India: an appraisal -- Chapter 6. A study on big data privacy in cross-industrial challenges and legal implications -- Chapter 7. Smart healthcare and digitalization: technological and cybersecurity challenges -- Chapter 8. Internet banking safety framework: an evaluation of the banking industry in Bangladesh -- Chapter 9. Data privacy policy: cyber security implications on retail operations -- Chapter 10. Cyber security at the heart of open banking: an existing and futuristic approach -- Chapter 11. A study on the perceptions of internet users with respect to information sensitivity in Delhi. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape." | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 06/30/2022). | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Industries |x Data processing |x Security measures. | |
700 | 1 | |a Baral, Sukanta Kumar, |e editor. | |
700 | 1 | |a Goel, Richa, |e editor. | |
700 | 1 | |a Jahan, Sarkar, |e editor. | |
700 | 1 | |a Rahman, Md Mashiur, |e editor. | |
700 | 1 | |a Sultan, Jahangir, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1668434482 |z 9781668434482 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3448-2 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00284479 |
---|---|
_version_ | 1804751463974436864 |
adam_text | |
any_adam_object | |
author2 | Baral, Sukanta Kumar Goel, Richa Jahan, Sarkar Rahman, Md Mashiur Sultan, Jahangir |
author2_role | edt edt edt edt edt |
author2_variant | s k b sk skb r g rg s j sj m m r mm mmr j s js |
author_facet | Baral, Sukanta Kumar Goel, Richa Jahan, Sarkar Rahman, Md Mashiur Sultan, Jahangir |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .C73 2022eb |
callnumber-search | TK5105.59 .C73 2022eb |
callnumber-sort | TK 45105.59 C73 42022EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Cyber security trend analysis: an Indian perspective -- Chapter 2. Role of artificial intelligence on cybersecurity and its control -- Chapter 3. Analysis and mitigation strategies of security issues of software-defined networks -- Chapter 4. Role of Bangladesh bank on cybersecurity in FinTech -- Chapter 5. Cyber security legal framework in India: an appraisal -- Chapter 6. A study on big data privacy in cross-industrial challenges and legal implications -- Chapter 7. Smart healthcare and digitalization: technological and cybersecurity challenges -- Chapter 8. Internet banking safety framework: an evaluation of the banking industry in Bangladesh -- Chapter 9. Data privacy policy: cyber security implications on retail operations -- Chapter 10. Cyber security at the heart of open banking: an existing and futuristic approach -- Chapter 11. A study on the perceptions of internet users with respect to information sensitivity in Delhi. |
ctrlnum | (CaBNVSL)slc00002872 (OCoLC)1322059921 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03241nam a2200517 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00284479</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20220629134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">220630s2022 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668434505</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668434482</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668434490</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668434482</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668434499</subfield><subfield code="q">softcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-3448-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00002872</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1322059921</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.C73 2022eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cross-industry applications of cyber security frameworks </subfield><subfield code="c">Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">19 PDFs (244 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Cyber security trend analysis: an Indian perspective -- Chapter 2. Role of artificial intelligence on cybersecurity and its control -- Chapter 3. Analysis and mitigation strategies of security issues of software-defined networks -- Chapter 4. Role of Bangladesh bank on cybersecurity in FinTech -- Chapter 5. Cyber security legal framework in India: an appraisal -- Chapter 6. A study on big data privacy in cross-industrial challenges and legal implications -- Chapter 7. Smart healthcare and digitalization: technological and cybersecurity challenges -- Chapter 8. Internet banking safety framework: an evaluation of the banking industry in Bangladesh -- Chapter 9. Data privacy policy: cyber security implications on retail operations -- Chapter 10. Cyber security at the heart of open banking: an existing and futuristic approach -- Chapter 11. A study on the perceptions of internet users with respect to information sensitivity in Delhi.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape."</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 06/30/2022).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Industries</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baral, Sukanta Kumar,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Richa,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jahan, Sarkar,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahman, Md Mashiur,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sultan, Jahangir,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668434482</subfield><subfield code="z">9781668434482</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3448-2</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00284479 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:58Z |
institution | BVB |
isbn | 9781668434505 |
language | English |
oclc_num | 1322059921 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 19 PDFs (244 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global, |
record_format | marc |
spelling | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2022. 19 PDFs (244 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Cyber security trend analysis: an Indian perspective -- Chapter 2. Role of artificial intelligence on cybersecurity and its control -- Chapter 3. Analysis and mitigation strategies of security issues of software-defined networks -- Chapter 4. Role of Bangladesh bank on cybersecurity in FinTech -- Chapter 5. Cyber security legal framework in India: an appraisal -- Chapter 6. A study on big data privacy in cross-industrial challenges and legal implications -- Chapter 7. Smart healthcare and digitalization: technological and cybersecurity challenges -- Chapter 8. Internet banking safety framework: an evaluation of the banking industry in Bangladesh -- Chapter 9. Data privacy policy: cyber security implications on retail operations -- Chapter 10. Cyber security at the heart of open banking: an existing and futuristic approach -- Chapter 11. A study on the perceptions of internet users with respect to information sensitivity in Delhi. Restricted to subscribers or individual electronic text purchasers. "This book posits that rather than cybersecurity being simply an issue of securing systems and networks, corporate leaders need to think in terms of assuring the integrity and durability of the interconnected business and social structures that sit on top of an increasingly complex technology landscape." Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 06/30/2022). Computer networks Security measures. Computer security. Industries Data processing Security measures. Baral, Sukanta Kumar, editor. Goel, Richa, editor. Jahan, Sarkar, editor. Rahman, Md Mashiur, editor. Sultan, Jahangir, editor. IGI Global, publisher. Print version: 1668434482 9781668434482 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3448-2 Volltext |
spellingShingle | Cross-industry applications of cyber security frameworks Chapter 1. Cyber security trend analysis: an Indian perspective -- Chapter 2. Role of artificial intelligence on cybersecurity and its control -- Chapter 3. Analysis and mitigation strategies of security issues of software-defined networks -- Chapter 4. Role of Bangladesh bank on cybersecurity in FinTech -- Chapter 5. Cyber security legal framework in India: an appraisal -- Chapter 6. A study on big data privacy in cross-industrial challenges and legal implications -- Chapter 7. Smart healthcare and digitalization: technological and cybersecurity challenges -- Chapter 8. Internet banking safety framework: an evaluation of the banking industry in Bangladesh -- Chapter 9. Data privacy policy: cyber security implications on retail operations -- Chapter 10. Cyber security at the heart of open banking: an existing and futuristic approach -- Chapter 11. A study on the perceptions of internet users with respect to information sensitivity in Delhi. Computer networks Security measures. Computer security. Industries Data processing Security measures. |
title | Cross-industry applications of cyber security frameworks |
title_auth | Cross-industry applications of cyber security frameworks |
title_exact_search | Cross-industry applications of cyber security frameworks |
title_full | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors. |
title_fullStr | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors. |
title_full_unstemmed | Cross-industry applications of cyber security frameworks Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, and Sarkar Jahan, editors. |
title_short | Cross-industry applications of cyber security frameworks |
title_sort | cross industry applications of cyber security frameworks |
topic | Computer networks Security measures. Computer security. Industries Data processing Security measures. |
topic_facet | Computer networks Security measures. Computer security. Industries Data processing Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-3448-2 |
work_keys_str_mv | AT baralsukantakumar crossindustryapplicationsofcybersecurityframeworks AT goelricha crossindustryapplicationsofcybersecurityframeworks AT jahansarkar crossindustryapplicationsofcybersecurityframeworks AT rahmanmdmashiur crossindustryapplicationsofcybersecurityframeworks AT sultanjahangir crossindustryapplicationsofcybersecurityframeworks AT igiglobal crossindustryapplicationsofcybersecurityframeworks |