THE BOOK, IN ADDITION TO THE CYBER THREATS AND TECHNOLOGY, PROCESSES CYBER SECURITY FROM MANY SIDES AS A SOCIAL PHENOMENON AND HOW THE IMPLEMENTATION OF THE CYBER SECURITY STRATEGY IS CARRIED OUT.THE BOOK GIVES A PROFOUND IDEA OF THE MOST SPOKEN PHENOMENON OF THIS TIME. THE BOOK IS SUITABLE FOR A WIDE-RANGING AUDIENCE FROM GRADUATE TO PROFESSIONALS/PRACTITIONERS AND RESEARCHERS. RELEVANT DISCIPLINES FOR THE BOOK ARE TELECOMMUNICATIONS / NETWORK SECURITY, APPLIED MATHEMATICS / DATA ANALYSIS, MOBILE SYSTEMS / SECURITY, ENGINEERING / SECURITY OF CRITICAL INFRASTRUCTURE AND MILITARY SCIENCE / SECURITY.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
“This wonderfully documented text explores the mechanics and methods of digital security and the steps necessary to ensure privacy. ... For the professional who is mathematically literate, the book is a must-read. The reference sections that follow each chapter rival that of any PhD thesis ever written. It is magnificent in its scholarship.” (James Van Speybroeck, Computing Reviews, October, 2015)
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.
The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerEUR 14,25 für den Versand von Vereinigtes Königreich nach USA
Versandziele, Kosten & DauerAnbieter: Wonder Book, Frederick, MD, USA
Zustand: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Artikel-Nr. I04D-01468
Anzahl: 1 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9783319183015_new
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security. Artikel-Nr. 9783319183015
Anzahl: 1 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Hardcover. Zustand: Brand New. 2015 edition. 269 pages. 9.00x6.25x0.75 inches. In Stock. Artikel-Nr. x-331918301X
Anzahl: 2 verfügbar