語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity breaches and issues su...
~
Moore, Michelle,
Cybersecurity breaches and issues surrounding online threat protection[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Cybersecurity breaches and issues surrounding online threat protection/ Michelle Moore [editor].
其他作者:
Moore, Michelle,
出版者:
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : : IGI Global,, [2017]
面頁冊數:
PDFs (408 p.) : : ill.
標題:
Computer networks - Security measures.
標題:
Cloud computing - Security measures.
ISBN:
9781522519423 (ebk.)
ISBN:
9781522519416 (hbk.)
書目註:
Includes bibliographical references and index.
內容註:
An exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap.
摘要、提要註:
"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6
Cybersecurity breaches and issues surrounding online threat protection[electronic resource] /
Cybersecurity breaches and issues surrounding online threat protection
[electronic resource] /Michelle Moore [editor]. - Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :IGI Global,[2017] - PDFs (408 p.) :ill.
Includes bibliographical references and index.
An exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap.
Restricted to subscribers or individual electronic text purchasers.
"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522519423 (ebk.)Subjects--Topical Terms:
341462
Computer networks
--Security measures.Subjects--Index Terms:
Cloud based services
LC Class. No.: TK5105.59 / .C93 2017e
Dewey Class. No.: 005.8
Cybersecurity breaches and issues surrounding online threat protection[electronic resource] /
LDR
:03118nam a2200385 i 4500
001
478320
003
IGIG
005
19991103140507.0
006
m eo d
007
cr bn||||m|||a
008
181208s2017 paua fob 001 0 eng d
020
$a
9781522519423 (ebk.)
020
$a
9781522519416 (hbk.)
035
$a
(CaBNVSL)gtp00566730
035
$a
(OCoLC)968523990
035
$a
0000000283
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.59
$b
.C93 2017e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Cybersecurity breaches and issues surrounding online threat protection
$h
[electronic resource] /
$c
Michelle Moore [editor].
260
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
$b
IGI Global,
$c
[2017]
300
$a
PDFs (408 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
An exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 01/07/2017).
650
0
$a
Computer networks
$x
Security measures.
$3
341462
650
0
$a
Cloud computing
$x
Security measures.
$3
412456
653
$a
Cloud based services
653
$a
Cyber crime
653
$a
Data breaches
653
$a
Electronic data diffusion
653
$a
Internet of things (IoT)
653
$a
Robotics
700
1
$a
Moore, Michelle,
$e
editor.
$3
690501
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6
筆 0 讀者評論
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入