Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem. The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers…mehr
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem.
The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master’s degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
Professor Hamid Jahankhani has taught at both the undergraduate and postgraduate levels, full and part-time and supervised and examined research students at the M.Phil., Ph.D. levels and Doctorate in Professional Studies (DProf). His teaching has covered a broad range of computing modules in particular Information Security Management, Information Security Risk and Audit, Digital Forensics, Systems Design & Development, Telecommunications and Networking, Computer Systems. Hiss principal research area for a number of years has been in the field of information security management and digital forensics.
David Victor Kilpin is a Serial Entrepreneur with diverse interests in mining, property development, and technology. He holds a Masters in Social Innovation and is currently a Northumbria University doctoral candidate researching ‘Digital Transformation of Land Title Management: the case of mining in Zimbabwe.’ His mission is to advance commercial interests that foster Transparency and Accountability using Blockchain as a socio-technical benefit in developing countries.
Stefan Kendzierskyj is Commercial Director with a digital transformation organization and is Successful Published Author. Over the years, he has been with a number of leading-edge technology companies, covering domains in digital transformation, cybersecurity technologies and other frameworks. He consults and recommends strategic approaches for businesses to undertake critical decisions around these domains and implement innovative solutions to reach new markets. His understanding of validating the business reasons/impact, and not only technology, makes the overall end-to-end solution assessment highly successful. He possesses a strong technology background and also MSc in Cybersecurity from an NCSC/GCHQ accredited UK University and is also engaged in ongoing research in a number of key areas such as blockchain, IoT, digital twins, critical national infrastructure and cyberwarfare. He has published several works in Springer Nature of ‘Blockchain and Clinical Trial’ and Cyber Defence in the Age of AI and has a number of contributed chapter works, journal articles and conference papers. He also provides publisher services for the UK Disaster Victim Identification team and Interpol in the form of process tools to aid in the investigation work for mass fatalities. He is a regular speaker at cybersecurity events, digital transformation and thought leadership conferences and is Fellow of the Royal Society for the encouragement of Arts, Manufactures and Commerce (RSA) and Member of the Institution of Engineering and Technology (IET). He is also Member of IEEE working groups for AI ethical, privacy and transparency for autonomous and intelligent systems.
Inhaltsangabe
1. Digital leadership models, strategies and traits.- 2. Social Media, Challenges and Strategies in 5G and 6G.- 3. Cyber Security defence including Ransomware attacks for Small and Medium-Sized Businesses in the digital economy.- 4. Information Governance, security and e-Governance.- 5. The role of AR/ VR and Holographic technology in corporate decision making.- 6. 5G in vertical market transformation.- 7. IoT, IoMT, IIoT and IoNT.- 8. Blockchain and smart contracts.- 9. Zero trust security strategies and guideline.- 10. Predicting Algorithms shaping outcomes through manipulation.
1. Digital leadership models, strategies and traits.- 2. Social Media, Challenges and Strategies in 5G and 6G.- 3. Cyber Security defence including Ransomware attacks for Small and Medium-Sized Businesses in the digital economy.- 4. Information Governance, security and e-Governance.- 5. The role of AR/ VR and Holographic technology in corporate decision making.- 6. 5G in vertical market transformation.- 7. IoT, IoMT, IIoT and IoNT.- 8. Blockchain and smart contracts.- 9. Zero trust security strategies and guideline.- 10. Predicting Algorithms shaping outcomes through manipulation.
1. Digital leadership models, strategies and traits.- 2. Social Media, Challenges and Strategies in 5G and 6G.- 3. Cyber Security defence including Ransomware attacks for Small and Medium-Sized Businesses in the digital economy.- 4. Information Governance, security and e-Governance.- 5. The role of AR/ VR and Holographic technology in corporate decision making.- 6. 5G in vertical market transformation.- 7. IoT, IoMT, IIoT and IoNT.- 8. Blockchain and smart contracts.- 9. Zero trust security strategies and guideline.- 10. Predicting Algorithms shaping outcomes through manipulation.
1. Digital leadership models, strategies and traits.- 2. Social Media, Challenges and Strategies in 5G and 6G.- 3. Cyber Security defence including Ransomware attacks for Small and Medium-Sized Businesses in the digital economy.- 4. Information Governance, security and e-Governance.- 5. The role of AR/ VR and Holographic technology in corporate decision making.- 6. 5G in vertical market transformation.- 7. IoT, IoMT, IIoT and IoNT.- 8. Blockchain and smart contracts.- 9. Zero trust security strategies and guideline.- 10. Predicting Algorithms shaping outcomes through manipulation.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu