Next-Generation Enterprise Security and Governance
portes grátis
Next-Generation Enterprise Security and Governance
Ahmed, Mohiuddin; Barkat, Abu; Moustafa, Nour; Haskell-Dowland, Paul
Taylor & Francis Ltd
04/2022
248
Dura
Inglês
9780367639624
15 a 20 dias
517
Descrição não disponível.
Chapter 1: Enterprise Threat Intelligence
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Gestão da produção e do controlo de qualidade
- Gestão de rede
- Arquitectura do computador e projecto lógico
- Fraudes com computadores e hacking
- Posse e organização de empresas
- Economia
- Aspectos éticos e sociais da Tecnologia Informática
- Teoria da codificação e criptologia
- Privacidade e protecção de dados
- Aspectos jurídicos da Tecnologia Informática
Enterprise;Next-Generation Enterprise;Enterprise Security;Cloud Computing;Data Lake;Insider Threats;Its;NoSQL Database;Data Warehouse;Cyber Kill Chain;BCa;Vehicular Network;Vehicular Cloud;Data Discovery;Ransomware Attack;DDoS Attack;Sea;RSU;CV;Enterprise System;Market Manipulation;6G Generation;NCSS;Cognitive Engine;Shared Responsibility Model;VANET;Fraud Triangle;Attack Surface
Chapter 1: Enterprise Threat Intelligence
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Gestão da produção e do controlo de qualidade
- Gestão de rede
- Arquitectura do computador e projecto lógico
- Fraudes com computadores e hacking
- Posse e organização de empresas
- Economia
- Aspectos éticos e sociais da Tecnologia Informática
- Teoria da codificação e criptologia
- Privacidade e protecção de dados
- Aspectos jurídicos da Tecnologia Informática
Enterprise;Next-Generation Enterprise;Enterprise Security;Cloud Computing;Data Lake;Insider Threats;Its;NoSQL Database;Data Warehouse;Cyber Kill Chain;BCa;Vehicular Network;Vehicular Cloud;Data Discovery;Ransomware Attack;DDoS Attack;Sea;RSU;CV;Enterprise System;Market Manipulation;6G Generation;NCSS;Cognitive Engine;Shared Responsibility Model;VANET;Fraud Triangle;Attack Surface