The business of cybersecurity : foundations and ideologies / Ashwini Sathnur.
Material type: TextSeries: Publication details: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, (c)2019.Edition: First editionDescription: 1 online resource (71 pages) : illustrations (some color)Content type:- text
- computer
- online resource
- 9781948976190
- QA .B875 2019
Item type | Current library | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | QA (Browse shelf(Opens below)) | Link to resource | Available | |||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | QA (Browse shelf(Opens below)) | Link to resource | Available | |||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | QA (Browse shelf(Opens below)) | Link to resource | Available | |||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | QA (Browse shelf(Opens below)) | Link to resource | Available |
Browsing G. Allen Fleece Library shelves, Shelving location: ONLINE Close shelf browser (Hides shelf browser)
Chapter 1. Introduction to cybersecurity -- Chapter 2. Theory of cybersecurity -- Chapter 3. Emerging technologies for the theories of cybersecurity -- Chapter 4. Innovative ideologies of the theories of blockchain technologies -- Chapter 5. ICTs introduced into the applications of the concept of digital financial services and financial inclusion -- Chapter 6. The various steps of the processes of building cybersecure applications -- Chapter 7. The types of risks that emerge with the concept of fraud -- Chapter 8. Consumer protection and financial inclusion -- Chapter 9. Solar flares and quantum neural networks.
This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book createrenewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.
Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.
Description based on PDF viewed 05/03/2019.
There are no comments on this title.