Fraud prevention, confidentiality, and data security for modern businesses:
"The objective of this book is to provide an overview of the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business practices including the coverage of the organizational, strateg...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2023.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "The objective of this book is to provide an overview of the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business practices including the coverage of the organizational, strategic, and technological issues"-- |
Beschreibung: | 20 PDFs (347 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781668465837 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00302621 | ||
003 | IGIG | ||
005 | 20230210134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 230210s2023 pau fob 001 0 eng d | ||
020 | |a 9781668465837 |q PDF | ||
020 | |z 1668465817 |q hardcover | ||
020 | |z 9781668465813 |q print | ||
024 | 7 | |a 10.4018/978-1-6684-6581-3 |2 doi | |
035 | |a (CaBNVSL)slc00004040 | ||
035 | |a (OCoLC)1333156913 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HF5548.37 |b .F73 2023e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Fraud prevention, confidentiality, and data security for modern businesses |c [edited by] Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2023. | |
300 | |a 20 PDFs (347 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. The risks associated with ITIL information security management in micro companies -- Chapter 2. Usability of security mechanisms of e-health applications: cases from Ethiopia -- Chapter 3. Applications of information systems and data security in marketing management -- Chapter 4. A basic process of python use for IOTAP, data science, and rapid machine learning model development -- Chapter 5. A study of steganography approach for securing data in a confidential communication using encryption -- Chapter 6. Deception preclusion, discretion, and data safety for contemporary business -- Chapter 7. Evaluation of usability of e-commerce websites in Pakistan using system usability scale and heuristics methods -- Chapter 8. Privacy and security under blockchain technology: challenges and solutions -- Chapter 9. Protection of personal data and internet of things security -- Chapter 10. Social engineering and data privacy -- Chapter 11. Relevance of cybersecurity in the business models -- Chapter 12. Implementation of big data in modern business: fraud detection and prevention techniques. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | |a "The objective of this book is to provide an overview of the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business practices including the coverage of the organizational, strategic, and technological issues"-- |c Provided by publisher. | ||
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 02/10/2023). | ||
650 | 0 | |a Computer networks |x Security meaures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Fraud |x Prevention. | |
700 | 1 | |a Malik, Praveen Kumar, |e editor. | |
700 | 1 | |a Naim, Arshi |d 1976- |e editor. | |
700 | 1 | |a Zaidi, Firasat |d 1973- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1668465817 |z 9781668465813 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-6581-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00302621 |
---|---|
_version_ | 1816797086722555904 |
adam_text | |
any_adam_object | |
author2 | Malik, Praveen Kumar Naim, Arshi 1976- Zaidi, Firasat 1973- |
author2_role | edt edt edt |
author2_variant | p k m pk pkm a n an f z fz |
author_facet | Malik, Praveen Kumar Naim, Arshi 1976- Zaidi, Firasat 1973- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .F73 2023e |
callnumber-search | HF5548.37 .F73 2023e |
callnumber-sort | HF 45548.37 F73 42023E |
callnumber-subject | HF - Commerce |
collection | ZDB-98-IGB |
contents | Chapter 1. The risks associated with ITIL information security management in micro companies -- Chapter 2. Usability of security mechanisms of e-health applications: cases from Ethiopia -- Chapter 3. Applications of information systems and data security in marketing management -- Chapter 4. A basic process of python use for IOTAP, data science, and rapid machine learning model development -- Chapter 5. A study of steganography approach for securing data in a confidential communication using encryption -- Chapter 6. Deception preclusion, discretion, and data safety for contemporary business -- Chapter 7. Evaluation of usability of e-commerce websites in Pakistan using system usability scale and heuristics methods -- Chapter 8. Privacy and security under blockchain technology: challenges and solutions -- Chapter 9. Protection of personal data and internet of things security -- Chapter 10. Social engineering and data privacy -- Chapter 11. Relevance of cybersecurity in the business models -- Chapter 12. Implementation of big data in modern business: fraud detection and prevention techniques. |
ctrlnum | (CaBNVSL)slc00004040 (OCoLC)1333156913 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03273nam a2200481 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00302621</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20230210134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">230210s2023 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668465837</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668465817</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668465813</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-6581-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00004040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1333156913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.F73 2023e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Fraud prevention, confidentiality, and data security for modern businesses </subfield><subfield code="c">[edited by] Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20 PDFs (347 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. The risks associated with ITIL information security management in micro companies -- Chapter 2. Usability of security mechanisms of e-health applications: cases from Ethiopia -- Chapter 3. Applications of information systems and data security in marketing management -- Chapter 4. A basic process of python use for IOTAP, data science, and rapid machine learning model development -- Chapter 5. A study of steganography approach for securing data in a confidential communication using encryption -- Chapter 6. Deception preclusion, discretion, and data safety for contemporary business -- Chapter 7. Evaluation of usability of e-commerce websites in Pakistan using system usability scale and heuristics methods -- Chapter 8. Privacy and security under blockchain technology: challenges and solutions -- Chapter 9. Protection of personal data and internet of things security -- Chapter 10. Social engineering and data privacy -- Chapter 11. Relevance of cybersecurity in the business models -- Chapter 12. Implementation of big data in modern business: fraud detection and prevention techniques.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The objective of this book is to provide an overview of the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business practices including the coverage of the organizational, strategic, and technological issues"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/10/2023).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security meaures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Fraud</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malik, Praveen Kumar,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Naim, Arshi</subfield><subfield code="d">1976-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zaidi, Firasat</subfield><subfield code="d">1973-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668465817</subfield><subfield code="z">9781668465813</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-6581-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00302621 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:59Z |
institution | BVB |
isbn | 9781668465837 |
language | English |
oclc_num | 1333156913 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 20 PDFs (347 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global, |
record_format | marc |
spelling | Fraud prevention, confidentiality, and data security for modern businesses [edited by] Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2023. 20 PDFs (347 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. The risks associated with ITIL information security management in micro companies -- Chapter 2. Usability of security mechanisms of e-health applications: cases from Ethiopia -- Chapter 3. Applications of information systems and data security in marketing management -- Chapter 4. A basic process of python use for IOTAP, data science, and rapid machine learning model development -- Chapter 5. A study of steganography approach for securing data in a confidential communication using encryption -- Chapter 6. Deception preclusion, discretion, and data safety for contemporary business -- Chapter 7. Evaluation of usability of e-commerce websites in Pakistan using system usability scale and heuristics methods -- Chapter 8. Privacy and security under blockchain technology: challenges and solutions -- Chapter 9. Protection of personal data and internet of things security -- Chapter 10. Social engineering and data privacy -- Chapter 11. Relevance of cybersecurity in the business models -- Chapter 12. Implementation of big data in modern business: fraud detection and prevention techniques. Restricted to subscribers or individual electronic text purchasers. "The objective of this book is to provide an overview of the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business practices including the coverage of the organizational, strategic, and technological issues"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/10/2023). Computer networks Security meaures. Computer security. Data protection. Fraud Prevention. Malik, Praveen Kumar, editor. Naim, Arshi 1976- editor. Zaidi, Firasat 1973- editor. IGI Global, publisher. Print version: 1668465817 9781668465813 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-6581-3 Volltext |
spellingShingle | Fraud prevention, confidentiality, and data security for modern businesses Chapter 1. The risks associated with ITIL information security management in micro companies -- Chapter 2. Usability of security mechanisms of e-health applications: cases from Ethiopia -- Chapter 3. Applications of information systems and data security in marketing management -- Chapter 4. A basic process of python use for IOTAP, data science, and rapid machine learning model development -- Chapter 5. A study of steganography approach for securing data in a confidential communication using encryption -- Chapter 6. Deception preclusion, discretion, and data safety for contemporary business -- Chapter 7. Evaluation of usability of e-commerce websites in Pakistan using system usability scale and heuristics methods -- Chapter 8. Privacy and security under blockchain technology: challenges and solutions -- Chapter 9. Protection of personal data and internet of things security -- Chapter 10. Social engineering and data privacy -- Chapter 11. Relevance of cybersecurity in the business models -- Chapter 12. Implementation of big data in modern business: fraud detection and prevention techniques. Computer networks Security meaures. Computer security. Data protection. Fraud Prevention. |
title | Fraud prevention, confidentiality, and data security for modern businesses |
title_auth | Fraud prevention, confidentiality, and data security for modern businesses |
title_exact_search | Fraud prevention, confidentiality, and data security for modern businesses |
title_full | Fraud prevention, confidentiality, and data security for modern businesses [edited by] Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi. |
title_fullStr | Fraud prevention, confidentiality, and data security for modern businesses [edited by] Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi. |
title_full_unstemmed | Fraud prevention, confidentiality, and data security for modern businesses [edited by] Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi. |
title_short | Fraud prevention, confidentiality, and data security for modern businesses |
title_sort | fraud prevention confidentiality and data security for modern businesses |
topic | Computer networks Security meaures. Computer security. Data protection. Fraud Prevention. |
topic_facet | Computer networks Security meaures. Computer security. Data protection. Fraud Prevention. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-6581-3 |
work_keys_str_mv | AT malikpraveenkumar fraudpreventionconfidentialityanddatasecurityformodernbusinesses AT naimarshi fraudpreventionconfidentialityanddatasecurityformodernbusinesses AT zaidifirasat fraudpreventionconfidentialityanddatasecurityformodernbusinesses AT igiglobal fraudpreventionconfidentialityanddatasecurityformodernbusinesses |