Cybersecurity for Decision Makers (eBook, PDF)
Redaktion: Vajjhala, Narasimha Rao; Strang, Kenneth David
47,95 €
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
47,95 €
Als Download kaufen
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
24 °P sammeln
Cybersecurity for Decision Makers (eBook, PDF)
Redaktion: Vajjhala, Narasimha Rao; Strang, Kenneth David
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 10.33MB
Andere Kunden interessierten sich auch für
- Nikki RobinsonMind the Tech Gap (eBook, PDF)36,95 €
- Cybersecurity for Decision Makers (eBook, ePUB)47,95 €
- Valerie LyonsThe Privacy Leader Compass (eBook, PDF)47,95 €
- Peter FaganThe Business of Cyber (eBook, PDF)47,95 €
- Ken DunhamCyber CISO Marksmanship (eBook, PDF)47,95 €
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience (eBook, PDF)47,95 €
- Nikki RobinsonMind the Tech Gap (eBook, ePUB)36,95 €
-
-
-
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 424
- Erscheinungstermin: 20. Juli 2023
- Englisch
- ISBN-13: 9781000909623
- Artikelnr.: 68125273
- Verlag: Taylor & Francis
- Seitenzahl: 424
- Erscheinungstermin: 20. Juli 2023
- Englisch
- ISBN-13: 9781000909623
- Artikelnr.: 68125273
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Narasimha Rao Vajjhala is working as an Associate Professor and the Chair of the Information Systems department at the School of IT and Computing at the American University of Nigeria. He had previously worked at the Faculty of Engineering and Architecture at the University of New York Tirana, Albania. He is a senior member of ACM and IEEE. He is the Editor-in-Chief (EiC) for the International Journal of Risk and Contingency Management (IJRCM) and the Guest Associate Editor for AI in Business, Frontiers in Artificial Intelligence (Scopus Indexed). He is also a member of the Project Management Institute (PMI). He has over 20 years of experience in teaching mainly programming and database-related courses at both graduate and undergraduate levels in Europe and Africa. He has also worked as a consultant in technology firms in Europe and has experience participating in EU-funded projects. He has completed a Doctorate in Information Systems and Technology (United States); holds a Master of Science in Computer Science and Applications (India), and a Master of Business Administration with a specialization in Information Systems (Switzerland). Kenneth David Strang has more than 290 mostly-sole-authored scholarly publications. He is a professor who teaches and supervises undergraduate, graduate, and doctoral students across five disciplines: business administration, management information systems, marketing/consumer behavior, supply chain management and economics/statistics. Ken has a doctorate in project management (operations research), an MBA (strategic management), a BSBA (marketing), an AAS (IT) all with summa cum laude/honors plus he is an internationally licensed Project Management Professional (PMI, USA), a Certified Research Professional (IIPMR, USA), a Certified Network Administrator (Novell, USA), a Certified Supply Chain Specialist/Procurement Professional (IIPMR, USA) and a Fellow Life Management Institute with distinction (LOMA, USA). Dr. Strang has lifetime grant projects valued over $7 million+, and he has won several honors including a Behavior Energy Climate Change Fellowship from the American Council for an Energy-Efficient Economy, the Emerald Literati award and Duke of Edinborough community service medal, along with several presidential citations.
1. Why Cyberattacks Disrupt Society and How to Mitigate Risk
2. Nature
Forms
and Remedies of Cyberbullying on Social Media Platforms: A Brief Philosophical Perspective
3. Cybersecurity and Human Factors: A Literature Review
4. An Introduction to Cybercrime and Cybersecurity: The Whys and Whos of Cybersecurity
5. Cybersecurity Attack Case Studies: Lessons Learned
6. Towards a Cybersecurity Awareness Program for Non-Technical Audiences in Malaysia
7. Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective
8. Intelligent Named Entity-Based Cybercrime Recognition System for Social Media Network Platforms
9. A Case Study on Zonal Analysis of Cybercrimes Over a Decade in India
10. Taming the Confluence of Space Systems and Cybersecurity
11. Regulating Cyber-Physical Systems for Safety Consequences
12. Mapping the State of the Art: Artificial Intelligence for Decision Making in Financial Crime
13. Understanding and Measuring the Impact of Cyberattacks on Businesses: A Systematic Literature Review
14. Problems and Ethical Issues in Cybersecurity Today: Some Critical Readings
15. An Empirical Investigation of Psychological Factors Affecting Compliance with Information Security Organizational Policies
16. Nexus between Banking Cybersecurity Breaches
Cyber Vulnerabilities
and Kidnap for Ransom in Nigeria: A Comparative Analysis of Kaduna and Abuja Metropolis
Nigeria
17. SME Cybersecurity Misconceptions: A Guide for Decision Makers
18. Rethinking the Impact of Informal Organizational Rules on Organizational Cybersecurity
19. Ethical Aspects of Cybersecurity in E-Commerce
20. Cybersecurity in Healthcare
21. Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems
22. Building Cybersecurity Capacity Through Education
Awareness
and Training
23. Cybersecurity Awareness: Prerequisites for Strategic Decision Makers
2. Nature
Forms
and Remedies of Cyberbullying on Social Media Platforms: A Brief Philosophical Perspective
3. Cybersecurity and Human Factors: A Literature Review
4. An Introduction to Cybercrime and Cybersecurity: The Whys and Whos of Cybersecurity
5. Cybersecurity Attack Case Studies: Lessons Learned
6. Towards a Cybersecurity Awareness Program for Non-Technical Audiences in Malaysia
7. Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective
8. Intelligent Named Entity-Based Cybercrime Recognition System for Social Media Network Platforms
9. A Case Study on Zonal Analysis of Cybercrimes Over a Decade in India
10. Taming the Confluence of Space Systems and Cybersecurity
11. Regulating Cyber-Physical Systems for Safety Consequences
12. Mapping the State of the Art: Artificial Intelligence for Decision Making in Financial Crime
13. Understanding and Measuring the Impact of Cyberattacks on Businesses: A Systematic Literature Review
14. Problems and Ethical Issues in Cybersecurity Today: Some Critical Readings
15. An Empirical Investigation of Psychological Factors Affecting Compliance with Information Security Organizational Policies
16. Nexus between Banking Cybersecurity Breaches
Cyber Vulnerabilities
and Kidnap for Ransom in Nigeria: A Comparative Analysis of Kaduna and Abuja Metropolis
Nigeria
17. SME Cybersecurity Misconceptions: A Guide for Decision Makers
18. Rethinking the Impact of Informal Organizational Rules on Organizational Cybersecurity
19. Ethical Aspects of Cybersecurity in E-Commerce
20. Cybersecurity in Healthcare
21. Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems
22. Building Cybersecurity Capacity Through Education
Awareness
and Training
23. Cybersecurity Awareness: Prerequisites for Strategic Decision Makers
1. Why Cyberattacks Disrupt Society and How to Mitigate Risk
2. Nature
Forms
and Remedies of Cyberbullying on Social Media Platforms: A Brief Philosophical Perspective
3. Cybersecurity and Human Factors: A Literature Review
4. An Introduction to Cybercrime and Cybersecurity: The Whys and Whos of Cybersecurity
5. Cybersecurity Attack Case Studies: Lessons Learned
6. Towards a Cybersecurity Awareness Program for Non-Technical Audiences in Malaysia
7. Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective
8. Intelligent Named Entity-Based Cybercrime Recognition System for Social Media Network Platforms
9. A Case Study on Zonal Analysis of Cybercrimes Over a Decade in India
10. Taming the Confluence of Space Systems and Cybersecurity
11. Regulating Cyber-Physical Systems for Safety Consequences
12. Mapping the State of the Art: Artificial Intelligence for Decision Making in Financial Crime
13. Understanding and Measuring the Impact of Cyberattacks on Businesses: A Systematic Literature Review
14. Problems and Ethical Issues in Cybersecurity Today: Some Critical Readings
15. An Empirical Investigation of Psychological Factors Affecting Compliance with Information Security Organizational Policies
16. Nexus between Banking Cybersecurity Breaches
Cyber Vulnerabilities
and Kidnap for Ransom in Nigeria: A Comparative Analysis of Kaduna and Abuja Metropolis
Nigeria
17. SME Cybersecurity Misconceptions: A Guide for Decision Makers
18. Rethinking the Impact of Informal Organizational Rules on Organizational Cybersecurity
19. Ethical Aspects of Cybersecurity in E-Commerce
20. Cybersecurity in Healthcare
21. Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems
22. Building Cybersecurity Capacity Through Education
Awareness
and Training
23. Cybersecurity Awareness: Prerequisites for Strategic Decision Makers
2. Nature
Forms
and Remedies of Cyberbullying on Social Media Platforms: A Brief Philosophical Perspective
3. Cybersecurity and Human Factors: A Literature Review
4. An Introduction to Cybercrime and Cybersecurity: The Whys and Whos of Cybersecurity
5. Cybersecurity Attack Case Studies: Lessons Learned
6. Towards a Cybersecurity Awareness Program for Non-Technical Audiences in Malaysia
7. Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective
8. Intelligent Named Entity-Based Cybercrime Recognition System for Social Media Network Platforms
9. A Case Study on Zonal Analysis of Cybercrimes Over a Decade in India
10. Taming the Confluence of Space Systems and Cybersecurity
11. Regulating Cyber-Physical Systems for Safety Consequences
12. Mapping the State of the Art: Artificial Intelligence for Decision Making in Financial Crime
13. Understanding and Measuring the Impact of Cyberattacks on Businesses: A Systematic Literature Review
14. Problems and Ethical Issues in Cybersecurity Today: Some Critical Readings
15. An Empirical Investigation of Psychological Factors Affecting Compliance with Information Security Organizational Policies
16. Nexus between Banking Cybersecurity Breaches
Cyber Vulnerabilities
and Kidnap for Ransom in Nigeria: A Comparative Analysis of Kaduna and Abuja Metropolis
Nigeria
17. SME Cybersecurity Misconceptions: A Guide for Decision Makers
18. Rethinking the Impact of Informal Organizational Rules on Organizational Cybersecurity
19. Ethical Aspects of Cybersecurity in E-Commerce
20. Cybersecurity in Healthcare
21. Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems
22. Building Cybersecurity Capacity Through Education
Awareness
and Training
23. Cybersecurity Awareness: Prerequisites for Strategic Decision Makers