Details

Title Advances in information security, privacy, and ethics (AISPE) book series. — Modern theories and practices for cyber ethics and security compliance
Other creators Yaokumah Winfred
Collection Электронные книги зарубежных издательств ; Общая коллекция
Subjects Internet — Security measures. ; Internet — Safety measures. ; Internet — Moral and ethical aspects. ; EBSCO eBooks
Document type Other
File type PDF
Language English
Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key on1126346944
Record create date 10/25/2019

Allowed Actions

pdf/2457116.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/2457116.epub
Action 'Download' will be available if you login or access site from another network
Group Anonymous
Network Internet

"This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"--.

Network User group Action
ILC SPbPU Local Network All
Read Print Download
Internet Authorized users SPbPU
Read Print Download
Internet Anonymous
  • Cover
  • Title Page
  • Copyright Page
  • Book Series
  • Table of Contents
  • Detailed Table of Contents
  • Preface
  • Chapter 1: Revisiting “Cyber” Definition
  • Chapter 2: Taxonomy of Cyber Threats to Application Security and Applicable Defenses
  • Chapter 3: Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft
  • Chapter 4: Deciphering the Myth About Non-Compliance and Its Impact on Cyber Security and Safety
  • Chapter 5: Towards a Security Competence of Software Developers
  • Chapter 6: Cyber Security Operations Centre Concepts and Implementation
  • Chapter 7: Students' Intentions on Cyber Ethics Issues
  • Chapter 8: Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics
  • Chapter 9: Evaluating the Effectiveness of Deterrence Theory in Information Security Compliance
  • Chapter 10: Factors Influencing Information Security Policy Compliance Behavior
  • Chapter 11: Biometric Authentication Schemes and Methods on Mobile Devices
  • Chapter 12: Security and Ethical Concerns of Affective Algorithmic Music Composition in Smart Spaces
  • Chapter 13: Towards a Student Security Compliance Model (SSCM)
  • Chapter 14: IT Security Investment Decision by New Zealand Owner-Managers
  • Chapter 15: Threat Detection in Cyber Security Using Data Mining and Machine Learning Techniques
  • Compilation of References
  • About the Contributors
  • Index
pdf/2457116.pdf

Access count: 0 
Last 30 days: 0

Detailed usage statistics

epub/2457116.epub

Access count: 0 
Last 30 days: 0

Detailed usage statistics