|
Showing 1 - 2 of
2 matches in All Departments
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
|
You may like...
In Too Deep
Lee Child, Andrew Child
Paperback
R395
R353
Discovery Miles 3 530
|