Showing 1 - 10 of 63
activities through a legal lens and from a cybersecurity perspective. This first chapter explores the concepts of data …
Persistent link: https://www.econbiz.de/10013406959
, and the use of robotics technologies. Key technologies for managing risk and cybersecurity, such as cloud and data … analysis, are presented. The topic of cybersecurity is one of the most important issues in the modern digital world. The …
Persistent link: https://www.econbiz.de/10013192356
, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge … of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced … text for Ph.D. and master’s degree programs in cybersecurity, network security and computer science. Each chapter is …
Persistent link: https://www.econbiz.de/10013192364
Chapter 1. Legal Foundations -- Chapter 2. Property and Privacy in Context -- Chapter 3. Cybersecurity and Cybercrimes …Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the … fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time …
Persistent link: https://www.econbiz.de/10012814665
: Data Analytics and Data Mining -- Section III: Cybersecurity in a Global Context -- Chapter 9: Introduction to … Cybersecurity -- Chapter 10: Cybersecurity Threats: Malware in the Code -- Chapter 11: Cybersecurity Protection Framework -- Section … and social facets, including digital transformation, cybersecurity, international operations, marketing, finance, culture …
Persistent link: https://www.econbiz.de/10013202317
1. History of Money -- 2. Bitcoin -- 3. Ethereum -- 4. The Emergence of New Blockchains and Crypto-Assets -- 5. The Technology Behind Bitcoin: Blockchain -- 6. Cryptocurrencies -- 7. Stablecoins -- 8. Central Bank Digital Currencies -- 9. Wholesale Central Bank Digital Currencies -- 10. Retail...
Persistent link: https://www.econbiz.de/10013192320
Grundlagen und Theorie -- Risiken -- Faktor Mensch -- Social Engineering als Modus Operandi -- Verhaltensökonomie -- Befangenheit -- Lebenszyklus wirtschaftskrimineller Handlungen und Non-Compliance -- Kommunikation -- Erfolgsfaktor Handlungsfähigkeit.
Persistent link: https://www.econbiz.de/10012655213
finance, ICT, distributed ledger technology (DLT), cybersecurity, data protection, artificial intelligence, and …
Persistent link: https://www.econbiz.de/10012583338
& Other Emerging Technology Applications -- Chapter 15. Cybersecurity & Insurance -- Chapter 16. Next Stage Applications …
Persistent link: https://www.econbiz.de/10012399013
Part 1: People -- Chapter 1: Teams and Divisions -- Chapter 2: Hiring -- Chapter 3: Upskilling -- Chapter 4: People Management -- Chapter 5: Rewards and Recognition -- Chapter 6: People Processes -- Chapter 7: Rituals -- Part 2: Strategy -- Chapter 8: OKR Review -- Chapter 9: Setting up OKRs --...
Persistent link: https://www.econbiz.de/10013275863