Cybersecurity issues, challenges, and solutions in the business world:
"This book centers on the basics of cybersecurity innovation alongside the methods and strategies for organizations to adopt, allowing readers to have a more profound comprehension of cybersecurity in the business world"--
Saved in:
Other Authors: | , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2023.
|
Series: | Advances in information security, privacy, and ethics (AISPE) book series.
|
Subjects: | |
Online Access: | DE-862 DE-863 |
Summary: | "This book centers on the basics of cybersecurity innovation alongside the methods and strategies for organizations to adopt, allowing readers to have a more profound comprehension of cybersecurity in the business world"-- |
Physical Description: | 22 PDFs (288 Seiten) : illustrations (some color) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 9781668458297 |
Access: | Restricted to subscribers or individual electronic text purchasers. |
Staff View
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00297861 | ||
003 | IGIG | ||
005 | 20221116190106.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 221112s2023 paua fob 001 0 eng d | ||
020 | |a 9781668458297 |q PDF | ||
020 | |z 1668458276 |q hardcover | ||
020 | |z 9781668458273 |q print | ||
024 | 7 | |a 10.4018/978-1-6684-5827-3 |2 doi | |
035 | |a (CaBNVSL)slc00003801 | ||
035 | |a (OCoLC)1328141151 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HF5548.37 |b .C934 2023eb | |
082 | 7 | |a 658.478 |2 23 | |
245 | 0 | 0 | |a Cybersecurity issues, challenges, and solutions in the business world |c Suhasini Verma, Vidhisha Vyas, Keshav Kaushik. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2023. | |
300 | |a 22 PDFs (288 Seiten) : |b illustrations (some color) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Cyber security in the fintech industry: issues, challenges, and solutions -- Chapter 2. Cyber security in smart grids: role of digital advanced devices -- Chapter 3. Cybersecurity as a digital and economic enabler: way forward for developing economies -- Chapter 4. The importance of cybersecurity for organizations: implementing cybersecurity to prevent cyberattacks -- Chapter 5. Mounting cases of cyber-attacks and digital payment -- Chapter 6. KYC fraud: a new means to conduct financial fraud how to tackle it? -- Chapter 7. Governance of digital business in industry 4.0: legal and regulatory aspects -- Chapter 8. Information security governance: need of the hour -- Chapter 9. Cyber security policy in India: examining the issues, challenges, and framework -- Chapter 10. Security issues and solutions for resource-constrained IoT applications using lightweight cryptography -- Chapter 11. Graphical password authentication system for web and mobile applications in javascript -- Chapter 12. Security issues in blockchain-based businesses -- Chapter 13. Cybersecurity management in South African universities -- Chapter 14. Africa and council of Europe strategic partnership on cybersecurity -- Chapter 15. Synthesis of evidence on existing and emerging social engineering ransomware attack vectors. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | |a "This book centers on the basics of cybersecurity innovation alongside the methods and strategies for organizations to adopt, allowing readers to have a more profound comprehension of cybersecurity in the business world"-- |c Provided by publisher. | ||
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 11/12/2022). | ||
650 | 0 | |a Computer security |x Economic aspects. | |
650 | 0 | |a Data protection |x Economic aspects. | |
650 | 0 | |a Database security |x Economic aspects. | |
653 | |a Blockchain. | ||
653 | |a Corporate Governance. | ||
653 | |a Cybersecurity. | ||
653 | |a Data Mining. | ||
653 | |a Enterprise Security. | ||
653 | |a Fintech. | ||
653 | |a Information Security Governance. | ||
653 | |a Password Authentication. | ||
653 | |a Privacy. | ||
653 | |a Security Issues. | ||
653 | |a Social Media. | ||
700 | 1 | |a Kaushik, Keshav |e editor. | |
700 | 1 | |a Verma, Suhasini |d 1976- |e editor. | |
700 | 1 | |a Vyas, Vidhisha |d 1980- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1668458276 |z 9781668458273 |
830 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series. | |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5827-3 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5827-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Record in the Search Index
DE-BY-FWS_katkey | ZDB-98-IGB-00297861 |
---|---|
_version_ | 1826942601214820352 |
adam_text | |
any_adam_object | |
author2 | Kaushik, Keshav Verma, Suhasini 1976- Vyas, Vidhisha 1980- |
author2_role | edt edt edt |
author2_variant | k k kk s v sv v v vv |
author_facet | Kaushik, Keshav Verma, Suhasini 1976- Vyas, Vidhisha 1980- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .C934 2023eb |
callnumber-search | HF5548.37 .C934 2023eb |
callnumber-sort | HF 45548.37 C934 42023EB |
callnumber-subject | HF - Commerce |
collection | ZDB-98-IGB |
contents | Chapter 1. Cyber security in the fintech industry: issues, challenges, and solutions -- Chapter 2. Cyber security in smart grids: role of digital advanced devices -- Chapter 3. Cybersecurity as a digital and economic enabler: way forward for developing economies -- Chapter 4. The importance of cybersecurity for organizations: implementing cybersecurity to prevent cyberattacks -- Chapter 5. Mounting cases of cyber-attacks and digital payment -- Chapter 6. KYC fraud: a new means to conduct financial fraud how to tackle it? -- Chapter 7. Governance of digital business in industry 4.0: legal and regulatory aspects -- Chapter 8. Information security governance: need of the hour -- Chapter 9. Cyber security policy in India: examining the issues, challenges, and framework -- Chapter 10. Security issues and solutions for resource-constrained IoT applications using lightweight cryptography -- Chapter 11. Graphical password authentication system for web and mobile applications in javascript -- Chapter 12. Security issues in blockchain-based businesses -- Chapter 13. Cybersecurity management in South African universities -- Chapter 14. Africa and council of Europe strategic partnership on cybersecurity -- Chapter 15. Synthesis of evidence on existing and emerging social engineering ransomware attack vectors. |
ctrlnum | (CaBNVSL)slc00003801 (OCoLC)1328141151 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03945nam a2200625 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00297861</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20221116190106.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">221112s2023 paua fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668458297</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668458276</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668458273</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-5827-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00003801</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1328141151</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.C934 2023eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cybersecurity issues, challenges, and solutions in the business world </subfield><subfield code="c">Suhasini Verma, Vidhisha Vyas, Keshav Kaushik.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">22 PDFs (288 Seiten) :</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Cyber security in the fintech industry: issues, challenges, and solutions -- Chapter 2. Cyber security in smart grids: role of digital advanced devices -- Chapter 3. Cybersecurity as a digital and economic enabler: way forward for developing economies -- Chapter 4. The importance of cybersecurity for organizations: implementing cybersecurity to prevent cyberattacks -- Chapter 5. Mounting cases of cyber-attacks and digital payment -- Chapter 6. KYC fraud: a new means to conduct financial fraud how to tackle it? -- Chapter 7. Governance of digital business in industry 4.0: legal and regulatory aspects -- Chapter 8. Information security governance: need of the hour -- Chapter 9. Cyber security policy in India: examining the issues, challenges, and framework -- Chapter 10. Security issues and solutions for resource-constrained IoT applications using lightweight cryptography -- Chapter 11. Graphical password authentication system for web and mobile applications in javascript -- Chapter 12. Security issues in blockchain-based businesses -- Chapter 13. Cybersecurity management in South African universities -- Chapter 14. Africa and council of Europe strategic partnership on cybersecurity -- Chapter 15. Synthesis of evidence on existing and emerging social engineering ransomware attack vectors.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book centers on the basics of cybersecurity innovation alongside the methods and strategies for organizations to adopt, allowing readers to have a more profound comprehension of cybersecurity in the business world"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 11/12/2022).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Economic aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Economic aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security</subfield><subfield code="x">Economic aspects.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Corporate Governance.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Mining.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Enterprise Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fintech.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information Security Governance.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Password Authentication.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Privacy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Issues.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Media.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaushik, Keshav</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verma, Suhasini</subfield><subfield code="d">1976-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vyas, Vidhisha</subfield><subfield code="d">1980-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668458276</subfield><subfield code="z">9781668458273</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series.</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5827-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5827-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00297861 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:30:36Z |
institution | BVB |
isbn | 9781668458297 |
language | English |
oclc_num | 1328141151 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 22 PDFs (288 Seiten) : illustrations (some color) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series | Advances in information security, privacy, and ethics (AISPE) book series. |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Cybersecurity issues, challenges, and solutions in the business world Suhasini Verma, Vidhisha Vyas, Keshav Kaushik. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2023. 22 PDFs (288 Seiten) : illustrations (some color) text rdacontent electronic isbdmedia online resource rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Includes bibliographical references and index. Chapter 1. Cyber security in the fintech industry: issues, challenges, and solutions -- Chapter 2. Cyber security in smart grids: role of digital advanced devices -- Chapter 3. Cybersecurity as a digital and economic enabler: way forward for developing economies -- Chapter 4. The importance of cybersecurity for organizations: implementing cybersecurity to prevent cyberattacks -- Chapter 5. Mounting cases of cyber-attacks and digital payment -- Chapter 6. KYC fraud: a new means to conduct financial fraud how to tackle it? -- Chapter 7. Governance of digital business in industry 4.0: legal and regulatory aspects -- Chapter 8. Information security governance: need of the hour -- Chapter 9. Cyber security policy in India: examining the issues, challenges, and framework -- Chapter 10. Security issues and solutions for resource-constrained IoT applications using lightweight cryptography -- Chapter 11. Graphical password authentication system for web and mobile applications in javascript -- Chapter 12. Security issues in blockchain-based businesses -- Chapter 13. Cybersecurity management in South African universities -- Chapter 14. Africa and council of Europe strategic partnership on cybersecurity -- Chapter 15. Synthesis of evidence on existing and emerging social engineering ransomware attack vectors. Restricted to subscribers or individual electronic text purchasers. "This book centers on the basics of cybersecurity innovation alongside the methods and strategies for organizations to adopt, allowing readers to have a more profound comprehension of cybersecurity in the business world"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 11/12/2022). Computer security Economic aspects. Data protection Economic aspects. Database security Economic aspects. Blockchain. Corporate Governance. Cybersecurity. Data Mining. Enterprise Security. Fintech. Information Security Governance. Password Authentication. Privacy. Security Issues. Social Media. Kaushik, Keshav editor. Verma, Suhasini 1976- editor. Vyas, Vidhisha 1980- editor. IGI Global, publisher. Print version: 1668458276 9781668458273 Advances in information security, privacy, and ethics (AISPE) book series. |
spellingShingle | Cybersecurity issues, challenges, and solutions in the business world Advances in information security, privacy, and ethics (AISPE) book series. Chapter 1. Cyber security in the fintech industry: issues, challenges, and solutions -- Chapter 2. Cyber security in smart grids: role of digital advanced devices -- Chapter 3. Cybersecurity as a digital and economic enabler: way forward for developing economies -- Chapter 4. The importance of cybersecurity for organizations: implementing cybersecurity to prevent cyberattacks -- Chapter 5. Mounting cases of cyber-attacks and digital payment -- Chapter 6. KYC fraud: a new means to conduct financial fraud how to tackle it? -- Chapter 7. Governance of digital business in industry 4.0: legal and regulatory aspects -- Chapter 8. Information security governance: need of the hour -- Chapter 9. Cyber security policy in India: examining the issues, challenges, and framework -- Chapter 10. Security issues and solutions for resource-constrained IoT applications using lightweight cryptography -- Chapter 11. Graphical password authentication system for web and mobile applications in javascript -- Chapter 12. Security issues in blockchain-based businesses -- Chapter 13. Cybersecurity management in South African universities -- Chapter 14. Africa and council of Europe strategic partnership on cybersecurity -- Chapter 15. Synthesis of evidence on existing and emerging social engineering ransomware attack vectors. Computer security Economic aspects. Data protection Economic aspects. Database security Economic aspects. |
title | Cybersecurity issues, challenges, and solutions in the business world |
title_auth | Cybersecurity issues, challenges, and solutions in the business world |
title_exact_search | Cybersecurity issues, challenges, and solutions in the business world |
title_full | Cybersecurity issues, challenges, and solutions in the business world Suhasini Verma, Vidhisha Vyas, Keshav Kaushik. |
title_fullStr | Cybersecurity issues, challenges, and solutions in the business world Suhasini Verma, Vidhisha Vyas, Keshav Kaushik. |
title_full_unstemmed | Cybersecurity issues, challenges, and solutions in the business world Suhasini Verma, Vidhisha Vyas, Keshav Kaushik. |
title_short | Cybersecurity issues, challenges, and solutions in the business world |
title_sort | cybersecurity issues challenges and solutions in the business world |
topic | Computer security Economic aspects. Data protection Economic aspects. Database security Economic aspects. |
topic_facet | Computer security Economic aspects. Data protection Economic aspects. Database security Economic aspects. |
work_keys_str_mv | AT kaushikkeshav cybersecurityissueschallengesandsolutionsinthebusinessworld AT vermasuhasini cybersecurityissueschallengesandsolutionsinthebusinessworld AT vyasvidhisha cybersecurityissueschallengesandsolutionsinthebusinessworld AT igiglobal cybersecurityissueschallengesandsolutionsinthebusinessworld |