UID:
almahu_9947936588802882
Format:
30 PDFs (xxvi, 647 pages)
ISBN:
9781522547648
Content:
"This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrorism, cybersecurity trends, cyber offensive and defensive capability, digital forensics, cloud security, mobile security"--
Note:
Chapter 1. Social engineering in information security breaches and the factors that explain its success: an organizational perspective -- Chapter 2. Safe distances: online and RL hyper-personal relationships as potential attack surfaces -- Chapter 3. Ransomware: the cyber extortionist -- Chapter 4. Curtailing the threats to cloud computing in the fourth industrial revolution -- Chapter 5. The impact of IoT on information warfare -- Chapter 6. A generic self-evolving multi-agent defense approach against cyber attacks -- Chapter 7. The different aspects of information security education -- Chapter 8. Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment -- Chapter 9. Dynamic risk assessment in IT environments: a decision guide -- Chapter 10. Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online -- Chapter 11. Cyber resilience for the internet of things -- Chapter 12. Developing cybersecurity resilience in the provincial government -- Chapter 13. Government's dynamic approach to addressing challenges of cybersecurity in South Africa -- Chapter 14. Information security management: a South African public sector perspective -- Chapter 15. Inducing six-word stories from curated text sets to anticipate cyberwar in 4IR -- Chapter 16. Terrorism in the age of information: unpuzzling the connection of terrorism and the media in the fourth industrial revolution -- Chapter 17. Cybersecurity risks and automated maritime container terminals in the age of 4IR -- Chapter 18. Cyber security education in the fourth industrial revolution: the case of South Africa -- Chapter 19. Mobile device brand loyalty of youth: perceived value vs. cybersecurity choices -- Chapter 20. Mobile security in low-income households' businesses: a measure of financial inclusion.
,
Also available in print.
,
Mode of access: World Wide Web.
Additional Edition:
Print version: ISBN 1522547630
Additional Edition:
ISBN 9781522547631
Language:
English
DOI:
10.4018/978-1-5225-4763-1
URL:
Chapter PDFs via platform:
URL:
Volltext
(URL des Erstveröffentlichers)
Bookmarklink