Effective cybersecurity operations for enterprise-wide systems:
"This publication examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many such publications do not include an enterprise-wide perspective of the research. The proposed pu...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2023.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This publication examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many such publications do not include an enterprise-wide perspective of the research. The proposed publication will enhance the field by providing such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others"-- |
Beschreibung: | 19 PDFs (328 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781668490204 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00317108 | ||
003 | IGIG | ||
005 | 20230615134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 230615s2023 pau fob 001 0 eng d | ||
020 | |a 9781668490204 |q PDF | ||
020 | |z 1668490188 |q hardcover | ||
020 | |z 9781668490181 |q print | ||
024 | 7 | |a 10.4018/978-1-6684-9018-1 |2 doi | |
035 | |a (CaBNVSL)slc00004550 | ||
035 | |a (OCoLC)1382730132 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HD30.38 |b .E34 2023e | |
082 | 7 | |a 658.4/78 |2 23 | |
245 | 0 | 0 | |a Effective cybersecurity operations for enterprise-wide systems |c edited by Festus Adedoyin, Bryan Christiansen. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2023. | |
300 | |a 19 PDFs (328 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Predicting cyber security behaviors through psychosocial and demographic conditions during COVID-19 -- Chapter 2. A comprehensive cybersecurity framework for present and future global information technology organizations -- Chapter 3. Examining data privacy through the lens of government regulations -- Chapter 4. Zero day vulnerability assessment: exploit detection and various design patterns in cyber software -- Chapter 5. Pragmatic risk-based approach to cybersecurity: establishing a risk-enhanced unified set of security controls -- Chapter 6. HES: a case study on cybersecurity and privacy risks in health surveillance systems -- Chapter 7. Imperatives of risk analysis and asset management on cyber security in a technology-driven economy -- Chapter 8. Cybersecurity disclosure and corporate reputation: rising popularity of cybersecurity in the business world -- Chapter 9. Equifinality in cybersecurity research: opportunities and future research -- Chapter 10. Information security threats of automation in the water industry: an exploratory study of England and Wales -- Chapter 11. Exploring cybersecurity, misinformation, and interference in voting and elections through cyberspace -- Chapter 12. A human-centric cybersecurity framework for ensuring cybersecurity readiness in universities. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | |a "This publication examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many such publications do not include an enterprise-wide perspective of the research. The proposed publication will enhance the field by providing such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others"-- |c Provided by publisher. | ||
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 06/15/2023). | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
700 | 1 | |a Adedoyin, Festus |d 1989- |e editor. | |
700 | 1 | |a Christiansen, Bryan |d 1960- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1668490188 |z 9781668490181 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-9018-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00317108 |
---|---|
_version_ | 1816797088586924032 |
adam_text | |
any_adam_object | |
author2 | Adedoyin, Festus 1989- Christiansen, Bryan 1960- |
author2_role | edt edt |
author2_variant | f a fa b c bc |
author_facet | Adedoyin, Festus 1989- Christiansen, Bryan 1960- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.38 .E34 2023e |
callnumber-search | HD30.38 .E34 2023e |
callnumber-sort | HD 230.38 E34 42023E |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB |
contents | Chapter 1. Predicting cyber security behaviors through psychosocial and demographic conditions during COVID-19 -- Chapter 2. A comprehensive cybersecurity framework for present and future global information technology organizations -- Chapter 3. Examining data privacy through the lens of government regulations -- Chapter 4. Zero day vulnerability assessment: exploit detection and various design patterns in cyber software -- Chapter 5. Pragmatic risk-based approach to cybersecurity: establishing a risk-enhanced unified set of security controls -- Chapter 6. HES: a case study on cybersecurity and privacy risks in health surveillance systems -- Chapter 7. Imperatives of risk analysis and asset management on cyber security in a technology-driven economy -- Chapter 8. Cybersecurity disclosure and corporate reputation: rising popularity of cybersecurity in the business world -- Chapter 9. Equifinality in cybersecurity research: opportunities and future research -- Chapter 10. Information security threats of automation in the water industry: an exploratory study of England and Wales -- Chapter 11. Exploring cybersecurity, misinformation, and interference in voting and elections through cyberspace -- Chapter 12. A human-centric cybersecurity framework for ensuring cybersecurity readiness in universities. |
ctrlnum | (CaBNVSL)slc00004550 (OCoLC)1382730132 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03637nam a2200457 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00317108</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20230615134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">230615s2023 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668490204</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668490188</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668490181</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-9018-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00004550</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1382730132</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD30.38</subfield><subfield code="b">.E34 2023e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Effective cybersecurity operations for enterprise-wide systems </subfield><subfield code="c">edited by Festus Adedoyin, Bryan Christiansen.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">19 PDFs (328 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Predicting cyber security behaviors through psychosocial and demographic conditions during COVID-19 -- Chapter 2. A comprehensive cybersecurity framework for present and future global information technology organizations -- Chapter 3. Examining data privacy through the lens of government regulations -- Chapter 4. Zero day vulnerability assessment: exploit detection and various design patterns in cyber software -- Chapter 5. Pragmatic risk-based approach to cybersecurity: establishing a risk-enhanced unified set of security controls -- Chapter 6. HES: a case study on cybersecurity and privacy risks in health surveillance systems -- Chapter 7. Imperatives of risk analysis and asset management on cyber security in a technology-driven economy -- Chapter 8. Cybersecurity disclosure and corporate reputation: rising popularity of cybersecurity in the business world -- Chapter 9. Equifinality in cybersecurity research: opportunities and future research -- Chapter 10. Information security threats of automation in the water industry: an exploratory study of England and Wales -- Chapter 11. Exploring cybersecurity, misinformation, and interference in voting and elections through cyberspace -- Chapter 12. A human-centric cybersecurity framework for ensuring cybersecurity readiness in universities.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This publication examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many such publications do not include an enterprise-wide perspective of the research. The proposed publication will enhance the field by providing such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 06/15/2023).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adedoyin, Festus</subfield><subfield code="d">1989-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christiansen, Bryan</subfield><subfield code="d">1960-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668490188</subfield><subfield code="z">9781668490181</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-9018-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00317108 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:52:00Z |
institution | BVB |
isbn | 9781668490204 |
language | English |
oclc_num | 1382730132 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 19 PDFs (328 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global, |
record_format | marc |
spelling | Effective cybersecurity operations for enterprise-wide systems edited by Festus Adedoyin, Bryan Christiansen. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2023. 19 PDFs (328 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Predicting cyber security behaviors through psychosocial and demographic conditions during COVID-19 -- Chapter 2. A comprehensive cybersecurity framework for present and future global information technology organizations -- Chapter 3. Examining data privacy through the lens of government regulations -- Chapter 4. Zero day vulnerability assessment: exploit detection and various design patterns in cyber software -- Chapter 5. Pragmatic risk-based approach to cybersecurity: establishing a risk-enhanced unified set of security controls -- Chapter 6. HES: a case study on cybersecurity and privacy risks in health surveillance systems -- Chapter 7. Imperatives of risk analysis and asset management on cyber security in a technology-driven economy -- Chapter 8. Cybersecurity disclosure and corporate reputation: rising popularity of cybersecurity in the business world -- Chapter 9. Equifinality in cybersecurity research: opportunities and future research -- Chapter 10. Information security threats of automation in the water industry: an exploratory study of England and Wales -- Chapter 11. Exploring cybersecurity, misinformation, and interference in voting and elections through cyberspace -- Chapter 12. A human-centric cybersecurity framework for ensuring cybersecurity readiness in universities. Restricted to subscribers or individual electronic text purchasers. "This publication examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many such publications do not include an enterprise-wide perspective of the research. The proposed publication will enhance the field by providing such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 06/15/2023). Business enterprises Computer networks Security measures. Computer networks Security measures. Computer security. Adedoyin, Festus 1989- editor. Christiansen, Bryan 1960- editor. IGI Global, publisher. Print version: 1668490188 9781668490181 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-9018-1 Volltext |
spellingShingle | Effective cybersecurity operations for enterprise-wide systems Chapter 1. Predicting cyber security behaviors through psychosocial and demographic conditions during COVID-19 -- Chapter 2. A comprehensive cybersecurity framework for present and future global information technology organizations -- Chapter 3. Examining data privacy through the lens of government regulations -- Chapter 4. Zero day vulnerability assessment: exploit detection and various design patterns in cyber software -- Chapter 5. Pragmatic risk-based approach to cybersecurity: establishing a risk-enhanced unified set of security controls -- Chapter 6. HES: a case study on cybersecurity and privacy risks in health surveillance systems -- Chapter 7. Imperatives of risk analysis and asset management on cyber security in a technology-driven economy -- Chapter 8. Cybersecurity disclosure and corporate reputation: rising popularity of cybersecurity in the business world -- Chapter 9. Equifinality in cybersecurity research: opportunities and future research -- Chapter 10. Information security threats of automation in the water industry: an exploratory study of England and Wales -- Chapter 11. Exploring cybersecurity, misinformation, and interference in voting and elections through cyberspace -- Chapter 12. A human-centric cybersecurity framework for ensuring cybersecurity readiness in universities. Business enterprises Computer networks Security measures. Computer networks Security measures. Computer security. |
title | Effective cybersecurity operations for enterprise-wide systems |
title_auth | Effective cybersecurity operations for enterprise-wide systems |
title_exact_search | Effective cybersecurity operations for enterprise-wide systems |
title_full | Effective cybersecurity operations for enterprise-wide systems edited by Festus Adedoyin, Bryan Christiansen. |
title_fullStr | Effective cybersecurity operations for enterprise-wide systems edited by Festus Adedoyin, Bryan Christiansen. |
title_full_unstemmed | Effective cybersecurity operations for enterprise-wide systems edited by Festus Adedoyin, Bryan Christiansen. |
title_short | Effective cybersecurity operations for enterprise-wide systems |
title_sort | effective cybersecurity operations for enterprise wide systems |
topic | Business enterprises Computer networks Security measures. Computer networks Security measures. Computer security. |
topic_facet | Business enterprises Computer networks Security measures. Computer networks Security measures. Computer security. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-9018-1 |
work_keys_str_mv | AT adedoyinfestus effectivecybersecurityoperationsforenterprisewidesystems AT christiansenbryan effectivecybersecurityoperationsforenterprisewidesystems AT igiglobal effectivecybersecurityoperationsforenterprisewidesystems |