A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Prashant A Upadhyaya is a Post-Doctoral Senior Research Fellow in Strategy at the National School of Leadership, Pune, India; a Fellow of the American Academy of Project Management, Colorado, USA. He is also an executive alumnus of IIM, Indore and IIT, Kanpur. He is a Certified Management Consultant and a Digital Transformation Advisor by profession. He is also a Certified Solutions Architect, Certified Enterprise Blockchain Professional, Certified API Designer / Security Architect / Product Manager and Lead Auditor for Information Security Management System. He has 20 years of experience across several domains and has managed projects across Europe, Middle East, Africa, South Asia and South East Asia. He has been an auditor, consultant and trainer for various MNCs, corporates and SMEs. He has won two awards viz. "Bharat Ratna Dr. Radhakrishnan Gold Medal Award" from GEPRA, Chennai, India and "Best Researcher Award" from VPA, Chennai, India for his contribution to entrepreneurship and process improvement initiatives for SMEs, respectively. Apart from his profession, he is also a "Jyotish Vidya Vachaspati" and known to many as Pt. Vibhootinath. In this book, he has tried to present a new paradigm where everything in the arena of information technology is designed around humans. He has also authored two other books viz. Ternicode: Law of Three (genre: Leadership / Business Management) and Swarbhanu Rahasya: Role of Nodes in Destiny (genre: Astrology / Indology).
Inhaltsangabe
Foreword. Preface. About the Author. Introduction. Chapter I: Need for Secrecy & its History. Chapter II: Evolution of Codes, Ciphers and Cryptography. Chapter III: Man v/s. Machine. Chapter IV: Of, For and By the Machines. Chapter V: Humanistic Design. Chapter VI: Anthropocentric Cryptography. Chapter VII: ManusCrypt. Chapter VIII: Business Use Case Scenario. Chapter IX: RAM For ManusCrypt. Chapter X: Architectural Appraisal. Chapter XI: Paradigm Shift. Chapter XII: Technical Notes. Appendix. Bibliography. Index
Foreword. Preface. About the Author. Introduction. Chapter I: Need for Secrecy & its History. Chapter II: Evolution of Codes, Ciphers and Cryptography. Chapter III: Man v/s. Machine. Chapter IV: Of, For and By the Machines. Chapter V: Humanistic Design. Chapter VI: Anthropocentric Cryptography. Chapter VII: ManusCrypt. Chapter VIII: Business Use Case Scenario. Chapter IX: RAM For ManusCrypt. Chapter X: Architectural Appraisal. Chapter XI: Paradigm Shift. Chapter XII: Technical Notes. Appendix. Bibliography. Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826