Strengthening industrial cybersecurity to protect business intelligence:
"In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable...
Saved in:
Other Authors: | , , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2024.
|
Subjects: | |
Online Access: | DE-862 DE-863 |
Summary: | "In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."-- |
Physical Description: | 21 PDFs (373 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 9798369308400 |
Access: | Restricted to subscribers or individual electronic text purchasers. |
Staff View
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00324810 | ||
003 | IGIG | ||
005 | 20240301134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240301s2024 pau fob 001 0 eng d | ||
020 | |a 9798369308400 |q PDF | ||
020 | |z 9798369308394 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-0839-4 |2 doi | |
035 | |a (CaBNVSL)slc00005589 | ||
035 | |a (OCoLC)1424888623 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HD38.7 |b .S774 2024e | |
082 | 7 | |a 658.4/72 |2 23 | |
245 | 0 | 0 | |a Strengthening industrial cybersecurity to protect business intelligence |c Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2024. | |
300 | |a 21 PDFs (373 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/01/2024). | ||
650 | 0 | |a Budiness intelligence. | |
650 | 0 | |a Computer security. | |
653 | |a Artificial Intelligence Applications. | ||
653 | |a Blockchain Usage. | ||
653 | |a Business Intelligence. | ||
653 | |a Cognitive Computing. | ||
653 | |a Cyber Threats. | ||
653 | |a Cybersecurity Controls. | ||
653 | |a Data Mining in Industry. | ||
653 | |a Deep Learning. | ||
653 | |a Digital Transformation. | ||
653 | |a Emerging Financial Technologies. | ||
653 | |a Industrial Organizations. | ||
653 | |a Intelligent Systems. | ||
653 | |a Organizational Risk Management. | ||
653 | |a Prescriptive Analytics. | ||
653 | |a Smart Cities. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Ahmad, Munir |e editor. | |
700 | 1 | |a Almuhaideb, Abdullah M. |e editor. | |
700 | 1 | |a Azizi, Neda |d 1980- |e editor. | |
700 | 1 | |a Saeed, Saqib |d 1980- |e editor. | |
700 | 1 | |a Tahir, Shahzaib |d 1991- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369308394 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Record in the Search Index
DE-BY-FWS_katkey | ZDB-98-IGB-00324810 |
---|---|
_version_ | 1826942602356719616 |
adam_text | |
any_adam_object | |
author2 | Ahmad, Munir Almuhaideb, Abdullah M. Azizi, Neda 1980- Saeed, Saqib 1980- Tahir, Shahzaib 1991- |
author2_role | edt edt edt edt edt |
author2_variant | m a ma a m a am ama n a na s s ss s t st |
author_facet | Ahmad, Munir Almuhaideb, Abdullah M. Azizi, Neda 1980- Saeed, Saqib 1980- Tahir, Shahzaib 1991- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD38 |
callnumber-raw | HD38.7 .S774 2024e |
callnumber-search | HD38.7 .S774 2024e |
callnumber-sort | HD 238.7 S774 42024E |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB |
contents | Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. |
ctrlnum | (CaBNVSL)slc00005589 (OCoLC)1424888623 |
dewey-full | 658.4/72 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/72 |
dewey-search | 658.4/72 |
dewey-sort | 3658.4 272 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04994nam a2200661 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00324810</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240301134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240301s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369308400</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369308394</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-0839-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1424888623</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD38.7</subfield><subfield code="b">.S774 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/72</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Strengthening industrial cybersecurity to protect business intelligence </subfield><subfield code="c">Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">21 PDFs (373 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/01/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Budiness intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence Applications.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain Usage.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Business Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cognitive Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Threats.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity Controls.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Mining in Industry.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Deep Learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital Transformation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Emerging Financial Technologies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Industrial Organizations.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligent Systems.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Organizational Risk Management.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Prescriptive Analytics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smart Cities.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmad, Munir</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almuhaideb, Abdullah M.</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Azizi, Neda</subfield><subfield code="d">1980-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Saqib</subfield><subfield code="d">1980-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tahir, Shahzaib</subfield><subfield code="d">1991-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369308394</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00324810 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:37Z |
institution | BVB |
isbn | 9798369308400 |
language | English |
oclc_num | 1424888623 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 21 PDFs (373 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2024. 21 PDFs (373 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. Restricted to subscribers or individual electronic text purchasers. "In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/01/2024). Budiness intelligence. Computer security. Artificial Intelligence Applications. Blockchain Usage. Business Intelligence. Cognitive Computing. Cyber Threats. Cybersecurity Controls. Data Mining in Industry. Deep Learning. Digital Transformation. Emerging Financial Technologies. Industrial Organizations. Intelligent Systems. Organizational Risk Management. Prescriptive Analytics. Smart Cities. Electronic books. Ahmad, Munir editor. Almuhaideb, Abdullah M. editor. Azizi, Neda 1980- editor. Saeed, Saqib 1980- editor. Tahir, Shahzaib 1991- editor. IGI Global, publisher. Print version: 9798369308394 |
spellingShingle | Strengthening industrial cybersecurity to protect business intelligence Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. Budiness intelligence. Computer security. |
title | Strengthening industrial cybersecurity to protect business intelligence |
title_auth | Strengthening industrial cybersecurity to protect business intelligence |
title_exact_search | Strengthening industrial cybersecurity to protect business intelligence |
title_full | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
title_fullStr | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
title_full_unstemmed | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
title_short | Strengthening industrial cybersecurity to protect business intelligence |
title_sort | strengthening industrial cybersecurity to protect business intelligence |
topic | Budiness intelligence. Computer security. |
topic_facet | Budiness intelligence. Computer security. Electronic books. |
work_keys_str_mv | AT ahmadmunir strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT almuhaidebabdullahm strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT azizineda strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT saeedsaqib strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT tahirshahzaib strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT igiglobal strengtheningindustrialcybersecuritytoprotectbusinessintelligence |