Next-Generation Enterprise Security and Governance
portes grátis
Next-Generation Enterprise Security and Governance
Haskell-Dowland, Paul; Ahmed, Mohiuddin; Moustafa, Nour; Barkat, Abu
Taylor & Francis Ltd
10/2024
248
Mole
9781032247755
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Chapter 1: Enterprise Threat Intelligence
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Aspectos éticos e sociais da Tecnologia Informática
- Fraudes com computadores e hacking
- Gestão da produção e do controlo de qualidade
- Arquitectura do computador e projecto lógico
- Teoria da codificação e criptologia
- Posse e organização de empresas
- Privacidade e protecção de dados
- Aspectos jurídicos da Tecnologia Informática
- Gestão de rede
- Economia
Enterprise;Next-Generation Enterprise;Enterprise Security;Cloud Computing;Data Lake;Insider Threats;Its;NoSQL Database;Data Warehouse;Cyber Kill Chain;BCa;Vehicular Network;Vehicular Cloud;Data Discovery;Ransomware Attack;DDoS Attack;Sea;RSU;CV;Enterprise System;Market Manipulation;6G Generation;NCSS;Cognitive Engine;Shared Responsibility Model;VANET;Fraud Triangle;Attack Surface
Chapter 1: Enterprise Threat Intelligence
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
Chapter 3: The Non-Malicious Risky Behaviour in the Enterprise Information System Security
Chapter 4: Cybersecurity Incident Response in the Enterprise
Chapter 5: Cyber-enabled crime as an enabler in market manipulation schemes
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
Chapter 8: Security, Privacy and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Aspectos éticos e sociais da Tecnologia Informática
- Fraudes com computadores e hacking
- Gestão da produção e do controlo de qualidade
- Arquitectura do computador e projecto lógico
- Teoria da codificação e criptologia
- Posse e organização de empresas
- Privacidade e protecção de dados
- Aspectos jurídicos da Tecnologia Informática
- Gestão de rede
- Economia
Enterprise;Next-Generation Enterprise;Enterprise Security;Cloud Computing;Data Lake;Insider Threats;Its;NoSQL Database;Data Warehouse;Cyber Kill Chain;BCa;Vehicular Network;Vehicular Cloud;Data Discovery;Ransomware Attack;DDoS Attack;Sea;RSU;CV;Enterprise System;Market Manipulation;6G Generation;NCSS;Cognitive Engine;Shared Responsibility Model;VANET;Fraud Triangle;Attack Surface