Electronic catalog

el cat en


 

База данных: Electronic library

Page 1, Results: 4

Отмеченные записи: 0

DDC 005.8
O-99

Ozkaya, Erdal.
    Hands-On Cybersecurity for Finance [[electronic resource] :] : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches. / Erdal. Ozkaya, Aslaner, Milad. - Birmingham : : Packt Publishing Ltd,, 2019. - 1 online resource (300 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/4A429C75-6706-4582-9E7A-55B5863EBF3C. - ISBN 9781788831734 (electronic bk.). - ISBN 178883173X (electronic bk.)
Online resource; title from PDF title page (EBSCO, viewed June 24, 2019)

~РУБ DDC 005.8

Рубрики: Computer networks--Security measures--Management.

   Cyber intelligence (Computer security)


   Financial institutions--Effect of technological innovations on.


   Internet--Security measures.


   COMPUTERS / Security / Networking.



Доп.точки доступа:
Aslaner, Milad.

Ozkaya, Erdal. Hands-On Cybersecurity for Finance [[electronic resource] :] : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches. / Erdal. Ozkaya, Aslaner, Milad., 2019. - 1 online resource (300 p.) с.

1.

Ozkaya, Erdal. Hands-On Cybersecurity for Finance [[electronic resource] :] : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches. / Erdal. Ozkaya, Aslaner, Milad., 2019. - 1 online resource (300 p.) с.


DDC 005.8
O-99

Ozkaya, Erdal.
    Hands-On Cybersecurity for Finance [[electronic resource] :] : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches. / Erdal. Ozkaya, Aslaner, Milad. - Birmingham : : Packt Publishing Ltd,, 2019. - 1 online resource (300 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/4A429C75-6706-4582-9E7A-55B5863EBF3C. - ISBN 9781788831734 (electronic bk.). - ISBN 178883173X (electronic bk.)
Online resource; title from PDF title page (EBSCO, viewed June 24, 2019)

~РУБ DDC 005.8

Рубрики: Computer networks--Security measures--Management.

   Cyber intelligence (Computer security)


   Financial institutions--Effect of technological innovations on.


   Internet--Security measures.


   COMPUTERS / Security / Networking.



Доп.точки доступа:
Aslaner, Milad.

DDC 005.8
S 43


    Security, privacy, and forensics issues in big data / / [edited by] Ramesh C. Joshi, Brij B. Gupta. - 4018/978-1-5225-9742-1. - Hershey, Pennsylvania : : IGI Global,, [2020]. - 1 online resource. ( час. мин.), 4018/978-1-5225-9742-1. - (Advances in Information Security, Privacy, and Ethics (AISPE) Book Series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A950C774-1418-44B4-A065-AC99B7006896. - ISBN 1522597441 (electronic book). - ISBN 9781522597445 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 02, 2019).
Параллельные издания: Print version: :
    Содержание:
Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution.

~РУБ DDC 005.8

Рубрики: Big data.

   Cyber intelligence (Computer security)


   Privacy, Right of.


   Digital forensic science.


   Big data.


   Cyber intelligence (Computer security)


   Digital forensic science.


   Privacy, Right of.


Аннотация: "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--

Доп.точки доступа:
Joshi, R. C., \editor.\
Gupta, Brij, (1982-) \editor.\
IGI Global,

Security, privacy, and forensics issues in big data / [Электронный ресурс] / [edited by] Ramesh C. Joshi, Brij B. Gupta., [2020]. - 1 online resource. с. (Введено оглавление)

2.

Security, privacy, and forensics issues in big data / [Электронный ресурс] / [edited by] Ramesh C. Joshi, Brij B. Gupta., [2020]. - 1 online resource. с. (Введено оглавление)


DDC 005.8
S 43


    Security, privacy, and forensics issues in big data / / [edited by] Ramesh C. Joshi, Brij B. Gupta. - 4018/978-1-5225-9742-1. - Hershey, Pennsylvania : : IGI Global,, [2020]. - 1 online resource. ( час. мин.), 4018/978-1-5225-9742-1. - (Advances in Information Security, Privacy, and Ethics (AISPE) Book Series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A950C774-1418-44B4-A065-AC99B7006896. - ISBN 1522597441 (electronic book). - ISBN 9781522597445 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 02, 2019).
Параллельные издания: Print version: :
    Содержание:
Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution.

~РУБ DDC 005.8

Рубрики: Big data.

   Cyber intelligence (Computer security)


   Privacy, Right of.


   Digital forensic science.


   Big data.


   Cyber intelligence (Computer security)


   Digital forensic science.


   Privacy, Right of.


Аннотация: "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--

Доп.точки доступа:
Joshi, R. C., \editor.\
Gupta, Brij, (1982-) \editor.\
IGI Global,

DDC 005.8
T 82


    Transdisciplinary perspectives on risk management and cyber intelligence / / Luisa Dall'Acqua, Irene Maria Gironacci [editors]. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xxiv, 273 pages) : : il. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/0FB13841-061D-4677-9086-2B6D3E0E243F. - ISBN 9781799843405 (electronic book). - ISBN 1799843408 (electronic book)
"Premier Reference Source" -- Front cover. Description based on online resource; title from digital title page (viewed on October 02, 2020).
Параллельные издания: Print version: : Transdisciplinary perspectives on risk management and cyber intelligence. - Hershey, PA : Information Science Reference, an imprint of IGI Global, [2021]. - ISBN 9781799843399
    Содержание:
Section 1. Strategies. Chapter 1. Cognitive science, orientism management (OM), and intelligence analysis ; Chapter 2. Homegrown terrorism: an analysis of its effects on PESTLE factors ; Chapter 3. Exploring cognitive biases, groupthink, and polythink syndrome in security decisions and business outcomes ; Chapter 4. Intel cycle for private professionals: acquisition, management, and dissemination of information ; Chapter 5. Tactical art of risk management in the history of Ninja ; Chapter 6. Private intel for corporate protection -- Section 2. Technologies. Chapter 7. Agent-based approach for monitoring risks in software development projects ; Chapter 8. State of the art of extended reality tools and applications in business ; Chapter 9. Literature review of recommendation systems ; Chapter 10. Augmented and emerging transformative interactions with technology: learning in post humanism ; Chapter 11. Origin of cyber warfare and how the espionage changed: a historical overview -- Section 3. Study cases. Chapter 12. General George S. Patton and our climate crisis: the stories people need building new myths for a sustainable earth ; Chapter 13. Lobbying a crucial mechanism for NGOs to obtain funding for poverty alleviation programs in Africa ; Chapter 14. Dichotomy and violent student protests: perceptions from students.

~РУБ DDC 005.8

Рубрики: Cyber intelligence (Computer security)

   Risk management.


   Cyberterrorism.


Аннотация: "This book explores perspectives and approaches to the intelligence analysis and risk management"--

Доп.точки доступа:
Dall'Acqua, Luisa, (1962-) \editor.\
Gironacci, Irene M., (1988-) \editor.\

Transdisciplinary perspectives on risk management and cyber intelligence / [Электронный ресурс] / Luisa Dall'Acqua, Irene Maria Gironacci [editors]., [2021]. - 1 online resource (xxiv, 273 pages) : с. (Введено оглавление)

3.

Transdisciplinary perspectives on risk management and cyber intelligence / [Электронный ресурс] / Luisa Dall'Acqua, Irene Maria Gironacci [editors]., [2021]. - 1 online resource (xxiv, 273 pages) : с. (Введено оглавление)


DDC 005.8
T 82


    Transdisciplinary perspectives on risk management and cyber intelligence / / Luisa Dall'Acqua, Irene Maria Gironacci [editors]. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xxiv, 273 pages) : : il. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/0FB13841-061D-4677-9086-2B6D3E0E243F. - ISBN 9781799843405 (electronic book). - ISBN 1799843408 (electronic book)
"Premier Reference Source" -- Front cover. Description based on online resource; title from digital title page (viewed on October 02, 2020).
Параллельные издания: Print version: : Transdisciplinary perspectives on risk management and cyber intelligence. - Hershey, PA : Information Science Reference, an imprint of IGI Global, [2021]. - ISBN 9781799843399
    Содержание:
Section 1. Strategies. Chapter 1. Cognitive science, orientism management (OM), and intelligence analysis ; Chapter 2. Homegrown terrorism: an analysis of its effects on PESTLE factors ; Chapter 3. Exploring cognitive biases, groupthink, and polythink syndrome in security decisions and business outcomes ; Chapter 4. Intel cycle for private professionals: acquisition, management, and dissemination of information ; Chapter 5. Tactical art of risk management in the history of Ninja ; Chapter 6. Private intel for corporate protection -- Section 2. Technologies. Chapter 7. Agent-based approach for monitoring risks in software development projects ; Chapter 8. State of the art of extended reality tools and applications in business ; Chapter 9. Literature review of recommendation systems ; Chapter 10. Augmented and emerging transformative interactions with technology: learning in post humanism ; Chapter 11. Origin of cyber warfare and how the espionage changed: a historical overview -- Section 3. Study cases. Chapter 12. General George S. Patton and our climate crisis: the stories people need building new myths for a sustainable earth ; Chapter 13. Lobbying a crucial mechanism for NGOs to obtain funding for poverty alleviation programs in Africa ; Chapter 14. Dichotomy and violent student protests: perceptions from students.

~РУБ DDC 005.8

Рубрики: Cyber intelligence (Computer security)

   Risk management.


   Cyberterrorism.


Аннотация: "This book explores perspectives and approaches to the intelligence analysis and risk management"--

Доп.точки доступа:
Dall'Acqua, Luisa, (1962-) \editor.\
Gironacci, Irene M., (1988-) \editor.\

DDC 005.8
B 31

Bautista, Wilson, (Jr.,).
    Practical cyber intelligence : : how action-based intelligence can be an effective response to incidents / / Wilson Bautista Jr. - Birmingham, UK : : Packt Publishing,, 2018. - 1 online resource (1 volume) : : il. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/88A7BDB5-1073-4B2D-B4FD-F9D442E4D6C8. - ISBN 9781788835244 (electronic bk.). - ISBN 1788835247 (electronic bk.)
Description based on online resource; title from title page (Safari, viewed May 3, 2018). Print version record.

~РУБ DDC 005.8

Рубрики: Cyber intelligence (Computer security)

   Cyberterrorism--Prevention.


   Computer networks--Security measures.


   Information technology--Security measures.


   Computer crimes--Prevention.


   COMPUTERS / Security / General


   Computer crimes--Prevention.


   Computer networks--Security measures.


   Cyber intelligence (Computer security)


   Cyberterrorism--Prevention.


   Information technology--Security measures.


Bautista, Wilson,. Practical cyber intelligence : [Электронный ресурс] : how action-based intelligence can be an effective response to incidents / / Wilson Bautista Jr., 2018. - 1 online resource (1 volume) : с.

Page 1, Results: 4

 

All acquisitions for 
Or select a month