Evolution of cross-sector cyber intelligent markets:
"In today's digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, tradition...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2024.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "In today's digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of these sophisticated and relentless adversaries. The need for a transformative solution that transcends organizational silos and fosters cross-sector collaboration, information sharing, and intelligence-driven defense strategies is now more critical than ever.Evolution of Cross-Sector Cyber Intelligent Markets explores the changes occurring within the field of intelligent markets, noting a significant paradigm shift that redefines cybersecurity. Through engaging narratives, real-world examples, and in-depth analysis, the book illuminates the key principles and objectives driving this evolution, shedding light on innovative solutions and collaborative efforts aimed at securing our digital future."-- |
Beschreibung: | 29 PDFs (469 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9798369319710 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00330983 | ||
003 | IGIG | ||
005 | 20240209134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240209s2024 pau fob 001 0 eng d | ||
020 | |a 9798369319710 |q PDF | ||
020 | |z 9798369319703 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-1970-3 |2 doi | |
035 | |a (CaBNVSL)slc00005543 | ||
035 | |a (OCoLC)1420824972 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HV6773 |b .E96 2024e | |
082 | 7 | |a 364.16/8 |2 23 | |
245 | 0 | 0 | |a Evolution of cross-sector cyber intelligent markets |c Eugene J. Lewis, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2024. | |
300 | |a 29 PDFs (469 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Critical analysis on the challenges of product distribution in global infrastructure and value-added systems in logistics and supply chain management -- Chapter 2. Marketing information systems (MkIS) parts shortage challenges in the aviation industry: foreign military sales (FMS) legacy system in cross-sector markets -- Chapter 3. Leadership learning and leadership coaching for government leaders in cybersecurity, artificial intelligence, and technology -- Chapter 4. SCADA systems and threats to critical infrastructures -- Chapter 5. Addressing childhood obesity through technology innovation -- Chapter 6. Barricades and hindrances concerning women managers in healthcare cybersecurity and technology -- Chapter 7. Healthcare information systems (HCIS) customer patient advocacy: cyber health deficiencies in the state of Washington -- Chapter 8. Healthcare technologies to address driving under the influence (DUI) of marijuana -- Chapter 9. Tele-dermatology through telehealth and healthcare internet technologies -- Chapter 10. Cyber leadership excellence: bridging knowledge gaps, maximizing returns -- Chapter 11. Maximizing cyber intelligence and security team capabilities through DEI: the hidden benefits of diversity as a strategic defense -- Chapter 12. Cybersecurity in connected autonomous vehicles: navigating the future of transportation -- Chapter 13. Generations in transition: navigating in the cybersecurity-infused job market -- Chapter 14. Using artificial intelligence as a public health surveillance tool during salmonella outbreaks -- Chapter 15. Organizational dynamics and bias in artificial intelligence (AI) recruitment algorithms -- Chapter 16. Influence of cybersecurity leadership resiliency on organizational readiness: exploring intersectionality with cyber risk liability valuation -- Chapter 17. Supply chain management: the role of emotional intelligence in supply chain leadership -- Chapter 18. Nuclear power organizations as learning organizations around cybersecurity, public health, public safety, and critical infrastructure protection -- Chapter 19. Coaching cybersecurity project managers and cybersecurity engineers -- Chapter 20. Why historically black colleges and universities (HBCUs) should employ new approaches to cybersecurity faculty development. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In today's digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of these sophisticated and relentless adversaries. The need for a transformative solution that transcends organizational silos and fosters cross-sector collaboration, information sharing, and intelligence-driven defense strategies is now more critical than ever.Evolution of Cross-Sector Cyber Intelligent Markets explores the changes occurring within the field of intelligent markets, noting a significant paradigm shift that redefines cybersecurity. Through engaging narratives, real-world examples, and in-depth analysis, the book illuminates the key principles and objectives driving this evolution, shedding light on innovative solutions and collaborative efforts aimed at securing our digital future."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 02/09/2024). | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Lewis, Eugene |d 1978- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369319703 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1970-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00330983 |
---|---|
_version_ | 1816797087965118464 |
adam_text | |
any_adam_object | |
author2 | Lewis, Eugene 1978- |
author2_role | edt |
author2_variant | e l el |
author_facet | Lewis, Eugene 1978- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 .E96 2024e |
callnumber-search | HV6773 .E96 2024e |
callnumber-sort | HV 46773 E96 42024E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | Chapter 1. Critical analysis on the challenges of product distribution in global infrastructure and value-added systems in logistics and supply chain management -- Chapter 2. Marketing information systems (MkIS) parts shortage challenges in the aviation industry: foreign military sales (FMS) legacy system in cross-sector markets -- Chapter 3. Leadership learning and leadership coaching for government leaders in cybersecurity, artificial intelligence, and technology -- Chapter 4. SCADA systems and threats to critical infrastructures -- Chapter 5. Addressing childhood obesity through technology innovation -- Chapter 6. Barricades and hindrances concerning women managers in healthcare cybersecurity and technology -- Chapter 7. Healthcare information systems (HCIS) customer patient advocacy: cyber health deficiencies in the state of Washington -- Chapter 8. Healthcare technologies to address driving under the influence (DUI) of marijuana -- Chapter 9. Tele-dermatology through telehealth and healthcare internet technologies -- Chapter 10. Cyber leadership excellence: bridging knowledge gaps, maximizing returns -- Chapter 11. Maximizing cyber intelligence and security team capabilities through DEI: the hidden benefits of diversity as a strategic defense -- Chapter 12. Cybersecurity in connected autonomous vehicles: navigating the future of transportation -- Chapter 13. Generations in transition: navigating in the cybersecurity-infused job market -- Chapter 14. Using artificial intelligence as a public health surveillance tool during salmonella outbreaks -- Chapter 15. Organizational dynamics and bias in artificial intelligence (AI) recruitment algorithms -- Chapter 16. Influence of cybersecurity leadership resiliency on organizational readiness: exploring intersectionality with cyber risk liability valuation -- Chapter 17. Supply chain management: the role of emotional intelligence in supply chain leadership -- Chapter 18. Nuclear power organizations as learning organizations around cybersecurity, public health, public safety, and critical infrastructure protection -- Chapter 19. Coaching cybersecurity project managers and cybersecurity engineers -- Chapter 20. Why historically black colleges and universities (HBCUs) should employ new approaches to cybersecurity faculty development. |
ctrlnum | (CaBNVSL)slc00005543 (OCoLC)1420824972 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05056nam a2200445 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00330983</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240209134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240209s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369319710</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369319703</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-1970-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005543</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1420824972</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773</subfield><subfield code="b">.E96 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Evolution of cross-sector cyber intelligent markets </subfield><subfield code="c">Eugene J. Lewis, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">29 PDFs (469 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Critical analysis on the challenges of product distribution in global infrastructure and value-added systems in logistics and supply chain management -- Chapter 2. Marketing information systems (MkIS) parts shortage challenges in the aviation industry: foreign military sales (FMS) legacy system in cross-sector markets -- Chapter 3. Leadership learning and leadership coaching for government leaders in cybersecurity, artificial intelligence, and technology -- Chapter 4. SCADA systems and threats to critical infrastructures -- Chapter 5. Addressing childhood obesity through technology innovation -- Chapter 6. Barricades and hindrances concerning women managers in healthcare cybersecurity and technology -- Chapter 7. Healthcare information systems (HCIS) customer patient advocacy: cyber health deficiencies in the state of Washington -- Chapter 8. Healthcare technologies to address driving under the influence (DUI) of marijuana -- Chapter 9. Tele-dermatology through telehealth and healthcare internet technologies -- Chapter 10. Cyber leadership excellence: bridging knowledge gaps, maximizing returns -- Chapter 11. Maximizing cyber intelligence and security team capabilities through DEI: the hidden benefits of diversity as a strategic defense -- Chapter 12. Cybersecurity in connected autonomous vehicles: navigating the future of transportation -- Chapter 13. Generations in transition: navigating in the cybersecurity-infused job market -- Chapter 14. Using artificial intelligence as a public health surveillance tool during salmonella outbreaks -- Chapter 15. Organizational dynamics and bias in artificial intelligence (AI) recruitment algorithms -- Chapter 16. Influence of cybersecurity leadership resiliency on organizational readiness: exploring intersectionality with cyber risk liability valuation -- Chapter 17. Supply chain management: the role of emotional intelligence in supply chain leadership -- Chapter 18. Nuclear power organizations as learning organizations around cybersecurity, public health, public safety, and critical infrastructure protection -- Chapter 19. Coaching cybersecurity project managers and cybersecurity engineers -- Chapter 20. Why historically black colleges and universities (HBCUs) should employ new approaches to cybersecurity faculty development.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In today's digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of these sophisticated and relentless adversaries. The need for a transformative solution that transcends organizational silos and fosters cross-sector collaboration, information sharing, and intelligence-driven defense strategies is now more critical than ever.Evolution of Cross-Sector Cyber Intelligent Markets explores the changes occurring within the field of intelligent markets, noting a significant paradigm shift that redefines cybersecurity. Through engaging narratives, real-world examples, and in-depth analysis, the book illuminates the key principles and objectives driving this evolution, shedding light on innovative solutions and collaborative efforts aimed at securing our digital future."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/09/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lewis, Eugene</subfield><subfield code="d">1978-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369319703</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1970-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00330983 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:52:00Z |
institution | BVB |
isbn | 9798369319710 |
language | English |
oclc_num | 1420824972 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 29 PDFs (469 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global, |
record_format | marc |
spelling | Evolution of cross-sector cyber intelligent markets Eugene J. Lewis, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2024. 29 PDFs (469 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Critical analysis on the challenges of product distribution in global infrastructure and value-added systems in logistics and supply chain management -- Chapter 2. Marketing information systems (MkIS) parts shortage challenges in the aviation industry: foreign military sales (FMS) legacy system in cross-sector markets -- Chapter 3. Leadership learning and leadership coaching for government leaders in cybersecurity, artificial intelligence, and technology -- Chapter 4. SCADA systems and threats to critical infrastructures -- Chapter 5. Addressing childhood obesity through technology innovation -- Chapter 6. Barricades and hindrances concerning women managers in healthcare cybersecurity and technology -- Chapter 7. Healthcare information systems (HCIS) customer patient advocacy: cyber health deficiencies in the state of Washington -- Chapter 8. Healthcare technologies to address driving under the influence (DUI) of marijuana -- Chapter 9. Tele-dermatology through telehealth and healthcare internet technologies -- Chapter 10. Cyber leadership excellence: bridging knowledge gaps, maximizing returns -- Chapter 11. Maximizing cyber intelligence and security team capabilities through DEI: the hidden benefits of diversity as a strategic defense -- Chapter 12. Cybersecurity in connected autonomous vehicles: navigating the future of transportation -- Chapter 13. Generations in transition: navigating in the cybersecurity-infused job market -- Chapter 14. Using artificial intelligence as a public health surveillance tool during salmonella outbreaks -- Chapter 15. Organizational dynamics and bias in artificial intelligence (AI) recruitment algorithms -- Chapter 16. Influence of cybersecurity leadership resiliency on organizational readiness: exploring intersectionality with cyber risk liability valuation -- Chapter 17. Supply chain management: the role of emotional intelligence in supply chain leadership -- Chapter 18. Nuclear power organizations as learning organizations around cybersecurity, public health, public safety, and critical infrastructure protection -- Chapter 19. Coaching cybersecurity project managers and cybersecurity engineers -- Chapter 20. Why historically black colleges and universities (HBCUs) should employ new approaches to cybersecurity faculty development. Restricted to subscribers or individual electronic text purchasers. "In today's digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of these sophisticated and relentless adversaries. The need for a transformative solution that transcends organizational silos and fosters cross-sector collaboration, information sharing, and intelligence-driven defense strategies is now more critical than ever.Evolution of Cross-Sector Cyber Intelligent Markets explores the changes occurring within the field of intelligent markets, noting a significant paradigm shift that redefines cybersecurity. Through engaging narratives, real-world examples, and in-depth analysis, the book illuminates the key principles and objectives driving this evolution, shedding light on innovative solutions and collaborative efforts aimed at securing our digital future."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/09/2024). Computer crimes Prevention. Computer networks Security measures. Computer security. Electronic books. Lewis, Eugene 1978- editor. IGI Global, publisher. Print version: 9798369319703 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1970-3 Volltext |
spellingShingle | Evolution of cross-sector cyber intelligent markets Chapter 1. Critical analysis on the challenges of product distribution in global infrastructure and value-added systems in logistics and supply chain management -- Chapter 2. Marketing information systems (MkIS) parts shortage challenges in the aviation industry: foreign military sales (FMS) legacy system in cross-sector markets -- Chapter 3. Leadership learning and leadership coaching for government leaders in cybersecurity, artificial intelligence, and technology -- Chapter 4. SCADA systems and threats to critical infrastructures -- Chapter 5. Addressing childhood obesity through technology innovation -- Chapter 6. Barricades and hindrances concerning women managers in healthcare cybersecurity and technology -- Chapter 7. Healthcare information systems (HCIS) customer patient advocacy: cyber health deficiencies in the state of Washington -- Chapter 8. Healthcare technologies to address driving under the influence (DUI) of marijuana -- Chapter 9. Tele-dermatology through telehealth and healthcare internet technologies -- Chapter 10. Cyber leadership excellence: bridging knowledge gaps, maximizing returns -- Chapter 11. Maximizing cyber intelligence and security team capabilities through DEI: the hidden benefits of diversity as a strategic defense -- Chapter 12. Cybersecurity in connected autonomous vehicles: navigating the future of transportation -- Chapter 13. Generations in transition: navigating in the cybersecurity-infused job market -- Chapter 14. Using artificial intelligence as a public health surveillance tool during salmonella outbreaks -- Chapter 15. Organizational dynamics and bias in artificial intelligence (AI) recruitment algorithms -- Chapter 16. Influence of cybersecurity leadership resiliency on organizational readiness: exploring intersectionality with cyber risk liability valuation -- Chapter 17. Supply chain management: the role of emotional intelligence in supply chain leadership -- Chapter 18. Nuclear power organizations as learning organizations around cybersecurity, public health, public safety, and critical infrastructure protection -- Chapter 19. Coaching cybersecurity project managers and cybersecurity engineers -- Chapter 20. Why historically black colleges and universities (HBCUs) should employ new approaches to cybersecurity faculty development. Computer crimes Prevention. Computer networks Security measures. Computer security. |
title | Evolution of cross-sector cyber intelligent markets |
title_auth | Evolution of cross-sector cyber intelligent markets |
title_exact_search | Evolution of cross-sector cyber intelligent markets |
title_full | Evolution of cross-sector cyber intelligent markets Eugene J. Lewis, editor. |
title_fullStr | Evolution of cross-sector cyber intelligent markets Eugene J. Lewis, editor. |
title_full_unstemmed | Evolution of cross-sector cyber intelligent markets Eugene J. Lewis, editor. |
title_short | Evolution of cross-sector cyber intelligent markets |
title_sort | evolution of cross sector cyber intelligent markets |
topic | Computer crimes Prevention. Computer networks Security measures. Computer security. |
topic_facet | Computer crimes Prevention. Computer networks Security measures. Computer security. Electronic books. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-1970-3 |
work_keys_str_mv | AT lewiseugene evolutionofcrosssectorcyberintelligentmarkets AT igiglobal evolutionofcrosssectorcyberintelligentmarkets |