Amazon cover image
Image from Amazon.com

The business of cybersecurity : foundations and ideologies / Ashwini Sathnur.

By: Contributor(s): Material type: TextTextSeries: Publication details: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, (c)2019.Edition: First editionDescription: 1 online resource (71 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781948976190
Subject(s): Genre/Form: LOC classification:
  • QA .B875 2019
Online resources:
Contents:
Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of digital financial services and financial inclusion -- Chapter 6. The various steps of the processes of building cybersecure applications -- Chapter 7. The types of risks that emerge with the concept of fraud -- Chapter 8. Consumer protection and financial inclusion -- Chapter 9. Solar flares and quantum neural networks.
Abstract: This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book createrenewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.
List(s) this item appears in: IZZY- duplicates
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number URL Status Date due Barcode
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library ONLINE QA (Browse shelf(Opens below)) Link to resource Available
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library ONLINE QA (Browse shelf(Opens below)) Link to resource Available
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library ONLINE QA (Browse shelf(Opens below)) Link to resource Available
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library ONLINE QA (Browse shelf(Opens below)) Link to resource Available

Chapter 1. Introduction to cybersecurity -- Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of digital financial services and financial inclusion -- Chapter 6. The various steps of the processes of building cybersecure applications -- Chapter 7. The types of risks that emerge with the concept of fraud -- Chapter 8. Consumer protection and financial inclusion -- Chapter 9. Solar flares and quantum neural networks.

This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book createrenewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.

Mode of access: World Wide Web.

System requirements: Adobe Acrobat reader.

Description based on PDF viewed 05/03/2019.

There are no comments on this title.

to post a comment.