10,95 €
10,95 €
inkl. MwSt.
Sofort per Download lieferbar
10,95 €
10,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
Als Download kaufen
10,95 €
inkl. MwSt.
Sofort per Download lieferbar
Jetzt verschenken
10,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
  • Format: ePub

This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of cybersecurity.
Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 4.85MB
Produktbeschreibung
This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of cybersecurity.

Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cybersecurity.

This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, D ausgeliefert werden.

Autorenporträt
Educated in the Birla Institute of Technology and Science Pilani, Indian Institute of Management Kozhikode, and Indian Institute of Management Lucknow, Ashwini Sathnur joined United Nations Development Programme as capacity development expert. With expertise in strategy planÂning, project management, supply chain management, software developÂment, programming, and application implementation and testing, she has been recognized in areas such as business process mapping, requirement study, and defining the various specifications for application implementaÂtion. Employment opportunities being worked upon include UNDP expert in Capacity Development, UN-Habitat Inclusive Digital Transitions in Cities Working Group member, ITU-T Focus Group Vehicular MultimeÂdia member, ITU-T United 4 Smart Sustainable Cities member, ITU-T Focus Group Digital Fiat Currency member, ITU-T Focus Group Digital Financial Services member, UN Space ISWI member (International Space Weather Initiative), ITU-T Artificial Intelligence Group member, and Knowledge Management in the United Nations.