129,95 €
129,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
65 °P sammeln
129,95 €
129,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
65 °P sammeln
Als Download kaufen
129,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
65 °P sammeln
Jetzt verschenken
129,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
65 °P sammeln
  • Format: PDF

This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes - which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as…mehr

Produktbeschreibung
This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes - which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies.

Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments' approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Professor Hamid Jahankhani has taught at both the undergraduate and postgraduate levels, full and part-time and supervised and examined research students at the MPhil and PhD levels and Doctorate in Professional Studies (DProf). Hamid's teaching has covered a broad range of computing modules in particular information security management, information security risk and audit, digital forensics, systems design and development, telecommunications and networking, and computer systems. Hamid's principal research area for a number of years has been in the field of information security management and digital forensics.   Dr. Gordon Bowen has a Doctorate in Business (University of Hull) and is a chartered marketer from the Chartered Institute of Marketing (UK). He is an associate professor in Management at Anglia Ruskin University and works as an associate lecturer at various universities and higher education institutions, including Warwick University, University of Gloucestershire, Northumbria University, Cumbria University, Regent's University London, Ulster University, University of Hertfordshire, University of Wales Trinity St. David, and Grenoble Graduate Business School. His research interests are strategy, marketing, digital marketing, and SMEs, and he supervises PhD and DBA students in these areas. Gordon has many completions at PhD and DBA. Gordon has reviewed articles for journals and conferences including MDPI Sustainability, European Academy of Management Conference, and International Journal of Technology Management. He has published 5 edited books on social media and cybersecurity and AI, which are recognised internationally.   Dr. Saeed Sharif is the leader of Intelligent Technologies Research Group and a course leader for MSc Computer Science with Industrial Placement at the School of Architecture, Computing, and Engineering. He has a PhD in artificial intelligence from Brunel University London. He is working closelypolicy makers nationally and internationally to improve the strategic systems. He has led the research development of different research projects associated with many industries. He has developed his research with the goal of improving the effectiveness, and efficiency of medical and health care systems. Dr. Saeed has published a significant number of research articles in highly reputable journals, international conferences, and book chapters, such as Elsevier Applied Soft Computing, Computer Methods and Programs in Biomedicine, IEEE Access, etc.   Osama Hussein is a security engineer and cybersecurity graduate student at Northumbria University. He holds an ISC^2 CC certificate and is an IBM AI Associate with a strong academic background in network engineering from the German University in Cairo. His research interests include post-quantum secure network protocols, information governance and cyber security, wireless network security, ethical hacking, and information assurance and risk management. As a security engineer, he has experience designing and implementing network security infrastructure, including VPN tunnels, ACLs, firewalls, intrusion prevention and detection systems, antivirus, and SIEM tools. He is skilled in device security hardening, internal and external routing, and site administration and has worked with Cisco and FortiGate devices.