|
Showing 1 - 3 of
3 matches in All Departments
The past decade has witnessed a leap in the cyber revolution around
the world. Significant progress has been made across a broad
spectrum of terminologies used in the cyber world. Various threats
have also emerged due to this cyber revolution that requires far
greater security measures than ever before. In order to adapt to
this evolution effectively and efficiently, it calls for a better
understanding of the ways in which we are ready to embrace this
change. Advances in Cyberology and the Advent of the Next-Gen
Information Revolution creates awareness of the information threats
that these technologies play on personal, societal, business, and
governmental levels. It discusses the development of information
and communication technologies (ICT), their connection with the
cyber revolution, and the impact that they have on every facet of
human life. Covering topics such as cloud computing, deepfake
technology, and social networking, this premier reference source is
an ideal resource for security professionals, IT managers,
administrators, students and educators of higher education,
librarians, researchers, and academicians.
The past decade has witnessed a leap in the cyber revolution around
the world. Significant progress has been made across a broad
spectrum of terminologies used in the cyber world. Various threats
have also emerged due to this cyber revolution that requires far
greater security measures than ever before. In order to adapt to
this evolution effectively and efficiently, it calls for a better
understanding of the ways in which we are ready to embrace this
change. Advances in Cyberology and the Advent of the Next-Gen
Information Revolution creates awareness of the information threats
that these technologies play on personal, societal, business, and
governmental levels. It discusses the development of information
and communication technologies (ICT), their connection with the
cyber revolution, and the impact that they have on every facet of
human life. Covering topics such as cloud computing, deepfake
technology, and social networking, this premier reference source is
an ideal resource for security professionals, IT managers,
administrators, students and educators of higher education,
librarians, researchers, and academicians.
|
|