語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity breaches and issues su...
~
Moore, Michelle,
FindBook
Google Book
Amazon
博客來
Cybersecurity breaches and issues surrounding online threat protection
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybersecurity breaches and issues surrounding online threat protection/ Michelle Moore [editor].
其他作者:
Moore, Michelle,
出版者:
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :IGI Global, : [2017],
面頁冊數:
PDFs (408 p.) :ill.
內容註:
An exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap.
標題:
Computer networks - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6
ISBN:
9781522519423 (ebk.)
Cybersecurity breaches and issues surrounding online threat protection
Cybersecurity breaches and issues surrounding online threat protection
[electronic resource] /Michelle Moore [editor]. - Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :IGI Global,[2017] - PDFs (408 p.) :ill.
Includes bibliographical references and index.
An exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap.
Restricted to subscribers or individual electronic text purchasers.
"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522519423 (ebk.)Subjects--Topical Terms:
579161
Computer networks
--Security measures.Subjects--Index Terms:
Cloud based services
LC Class. No.: TK5105.59 / .C93 2017e
Dewey Class. No.: 005.8
Cybersecurity breaches and issues surrounding online threat protection
LDR
:03118nmm a2200385 i 4500
001
2095143
003
IGIG
005
19991103140507.0
006
m eo d
007
cr bn||||m|||a
008
171207s2017 paua fob 001 0 eng d
020
$a
9781522519423 (ebk.)
020
$a
9781522519416 (hbk.)
035
$a
(CaBNVSL)gtp00566730
035
$a
(OCoLC)968523990
035
$a
0000000283
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.59
$b
.C93 2017e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Cybersecurity breaches and issues surrounding online threat protection
$h
[electronic resource] /
$c
Michelle Moore [editor].
260
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
$b
IGI Global,
$c
[2017]
300
$a
PDFs (408 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
An exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 01/07/2017).
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Cloud computing
$x
Security measures.
$3
1375313
653
$a
Cloud based services
653
$a
Cyber crime
653
$a
Data breaches
653
$a
Electronic data diffusion
653
$a
Internet of things (IoT)
653
$a
Robotics
700
1
$a
Moore, Michelle,
$e
editor.
$3
3231514
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9317953
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .C93 2017e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入