Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cybersecurity

Handbook of Research on Advancements of Contactless Technology and Service Innovation in Library and Information Science
Cybersecurity refers to the protection of computer systems, networks, and data from unauthorized access, theft, damage, or disruption. Cybersecurity includes various technologies, processes, and practices that aim to prevent, detect, and respond to cyber threats, such as malware, phishing, ransomware, or cyber espionage. Cybersecurity is crucial for protecting personal and financial information, intellectual property, critical infrastructure, and national security.
Published in Chapter:
Novel Library Innovations and Advancements After the COVID-19 Pandemic Era
Khushboo Jain (University of Petroleum and Energy Studies, India) and Arun Agarwal (Ramanujan College, India)
DOI: 10.4018/978-1-6684-7693-2.ch010
Abstract
This chapter investigates and reviews novel library innovations and advancements after the COVID-19 pandemic era. It draws attention to several ways that the pandemic is forcing libraries to embrace new technology. Doing so gives libraries a new setting in which to operate. Additionally, it provides a SWOT (strengths, weaknesses, opportunities, threats) analysis after the COVID-19 pandemic libraries, emphasizing the rapid, thorough adoption of technical innovations that have been underutilized for some time. Without a question, libraries and other organizations were at the forefront of innovations for service delivery during the global lockdown. It also evaluates the SWOT of the invention for novel library innovations and advancements after the COVID-19 pandemic era. This study also emphasizes the existing problems and difficulties as well as the upcoming developments and orientations in libraries.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Full Text Chapter Download: US $37.50 Add to Cart
Preserving Information Security Using Fractal-Based Cryptosystem
Cybersecurity is an act to protect data, devices, applications, servers, network from the malicious attack through various tools and techniques. The process also ensures the confidentiality, integrity, availability, and non-repudiation of the content.
Full Text Chapter Download: US $37.50 Add to Cart
Safe Distances: Online and RL Hyper-Personal Relationships as Potential Attack Surfaces
Information security (infosec) but broadly referring to technology and human systems that are built around the secure exchange, storage, and management of information.
Full Text Chapter Download: US $37.50 Add to Cart
Beware!: A Multimodal Analysis of Cautionary Tales in Strategic Cybersecurity Messaging Online
Protection against criminal access to one’s data and information and against criminal manipulation of computer networks/data/systems.
Full Text Chapter Download: US $37.50 Add to Cart
Government's Dynamic Approach to Addressing Challenges of Cybersecurity in South Africa
Is defined as the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, organization, and user assets.
Full Text Chapter Download: US $37.50 Add to Cart
Prevent and Combat Sexual Assault and Exploitation of Children on Cyberspace in Vietnam: Situations, Challenges, and Responses
is to protect computer networks from acts of theft or damage failure of hardware, software, or database, as well as from disruption or disorientation of services provided. These actions are applied and sentenced by the Law on Cybersecurity and Criminal Code of Vietnam.
Full Text Chapter Download: US $37.50 Add to Cart
Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects
Full Text Chapter Download: US $37.50 Add to Cart
A Black-Box Framework for Malicious Traffic Detection in ICT Environments
It is the organization and collection of resources, processes, and structures used to protect cyberspace from security events.
Full Text Chapter Download: US $37.50 Add to Cart
Corporate Digital Responsibility: Approaches of the Leading IT Companies
The application of technologies, processes and controls to protect computer systems, and the data they hold and transmit, from unauthorised use, theft, damage, and disruption. Within the business world, cybersecurity is widely seen as one of the major barriers to increasing business adoption of digital technologies.
Full Text Chapter Download: US $37.50 Add to Cart
The Significance of STEM Education for National Security
Cybersecurity is the protection of internet-connected systems such as hardware, software, and data from cyber threats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
Full Text Chapter Download: US $37.50 Add to Cart
The Increased Need for Cybersecurity in Developing Countries: COVID-19 and the Adverse Cybercrime Risks Imposed
The optimal state where users can function securely and achieve their goals in the cyberspace domain by effectively managing risks posed by multidimensional threats.
Full Text Chapter Download: US $37.50 Add to Cart
Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms
Cybersecurity refers to the set of technologies, processes, and practices designed to safeguard networks, devices, programs, and data from attack, threats, or unauthorized access.
Full Text Chapter Download: US $37.50 Add to Cart
Implications of Digital Transformation on the Strategy Development Process for Business Leaders
Cybersecurity is seen where security alerts and cyber-attacks are becoming more frequent and malicious, these threats include private access attempts and exploitation software or phishing, malware, web application attacks, and network penetration. Organisations can counter these threats through two key areas of innovation, security analytics and biometric identity measurement. The focus of security analytics is on predicting and preventing breaches through early identification and intervention of such threats, to apprehend intruders enabled through managed services platforms. Biometric security for a more secure, accurate, and convenient form of identification has become the standard for governments in all identification documentation. Biometric fingerprint sensors are the favoured identification method currently in use in commercial access control.
Full Text Chapter Download: US $37.50 Add to Cart
Intelligent Automation Using Machine and Deep Learning in Cybersecurity of Industrial IoT: CCTV Security and DDoS Attack Detection
It is a general term which describes technologies, processes, methods, and practices for the purpose of protection of internet-connected information systems from attacks, i.e., cyberattacks. Cybersecurity can refer to security of data, software or hardware within information systems.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy of Information and Data: Policies, Threats, and Solutions
The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks
A combination of technologies, processes, and behaviours aimed at preventing attacks, damage, and illegal access to networks, computers, applications, and data.
Full Text Chapter Download: US $37.50 Add to Cart
Security Awareness in the Internet of Everything
The protection of computer systems from theft and damage to their assets and from manipulation and distraction of their services.
Full Text Chapter Download: US $37.50 Add to Cart
Senior Citizens Learning Safe Behaviors on the Web: A Case Study Involving an Online Educational Game
Is a skill or capability, activity, or process by which Information and Communication Systems and Data are protected against damage, unauthorized use or any type of modification or exploitation.
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing Cybersecurity Protocols in Modern Healthcare Systems: Strategies and Best Practices
The practice of protecting systems, networks, and programs from digital attacks. In healthcare, cybersecurity is critical for protecting patient data, ensuring the integrity of medical records, and safeguarding the infrastructure of healthcare providers from cyber threats.
Full Text Chapter Download: US $37.50 Add to Cart
Change Management and Cybersecurity in Healthcare: Mitigating Human Factors and Risks
Cybersecurity refers to the practice of protecting computers, servers, networks, electronic systems, and data from unauthorized access, damage, theft, disruption, or other forms of cyber threats. It involves a range of measures, technologies, policies, and practices designed to ensure the confidentiality, integrity, and availability of digital information and resources.
Full Text Chapter Download: US $37.50 Add to Cart
Business Management and Strategy in Cybersecurity for Digital Transformation
The protection of data, servers, mobile devices, electronic systems, computers, and networks from malicious attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering and Data Privacy
The practice of defending network, devices, data and infrastructure from malicious users ensuring the security objectives such as confidentiality, integrity, privacy and non-repudiation
Full Text Chapter Download: US $37.50 Add to Cart
Generations in Transition: Navigating in the Cybersecurity-Infused Job Market
Cybersecurity refers to the practice of protecting computer systems, networks, and digital data from unauthorized access, cyberattacks, damage, or theft. It encompasses a wide range of technologies, processes, practices, and measures designed to safeguard information technology assets and ensure the confidentiality, integrity, and availability of data and digital systems. Cybersecurity aims to defend against various threats, including hackers, malware, phishing attempts, and other cybercrimes, by implementing security controls, protocols, and countermeasures. It is a critical field in today's interconnected digital world, as it helps organizations and individuals protect sensitive information and maintain the functionality and security of their digital environments.
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence Applications in Cybersecurity
This is an area of security focused on securing cyberspace or computer networks from unauthorized access and related fraud.
Full Text Chapter Download: US $37.50 Add to Cart
All the World's a Stage: Achieving Deliberate Practice and Performance Improvement Through Story-Based Learning
Protecting digital networks and systems from unauthorized usage or disruption.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Storing and Exchanging Medical Information
Refers to the practice of protecting computer systems, networks, and digital infrastructure from potential security breaches, unauthorized access, and cyber threats. It involves the implementation of measures, protocols, and technologies to safeguard information, prevent data breaches, and ensure the confidentiality, integrity, and availability of digital assets in the face of evolving cyber risks and attacks.
Full Text Chapter Download: US $37.50 Add to Cart
What the 3Vs Acronym Didn't Put Into Perspective?
Also known as computer security or IT security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity: What Matters to Consumers – An Exploratory Study
Cybersecurity deals with damage to, unauthorized use of, exploitation of electronic information and communications systems that ensure confidentiality, integrity and availability.
Full Text Chapter Download: US $37.50 Add to Cart
Federal Government Application of the Cloud Computing Application Integration Model
The process using technology and personnel to protect digital assets.
Full Text Chapter Download: US $37.50 Add to Cart
Penetration Testing and Cyber Security Studies in Bangladesh: Post-COVID-19 Managerial Issues
The protection of internet-connected systems, including their hardware, software, and data, against malicious cyberattacks is referred to as cybersecurity. To prevent unwanted access to data centers and other computerized systems, people and businesses alike engage in the practice of using two-factor authentication (2FA).
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Legislation
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
Full Text Chapter Download: US $37.50 Add to Cart
How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
Includes process, procedures, technologies, and controls designed to protect systems, networks, and data.
Full Text Chapter Download: US $37.50 Add to Cart
Detecting Individual-Level Deception in the Digital Age: The DETECT Model ©
Full Text Chapter Download: US $37.50 Add to Cart
Contemporary Security Threats: Some Proposals for Banking Networks in Bangladesh
The protection of internet-connected systems, including their hardware, software, and data, against malicious cyberattacks is referred to as cybersecurity. To prevent unwanted access to data centers and other computerized systems, people and businesses alike engage in the practice of using two-factor authentication (2FA).
Full Text Chapter Download: US $37.50 Add to Cart
The Value Proposition of Machine Learning in Construction Management: Exploring the Trends in Construction 4.0 and Beyond
Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Digital Innovation in Healthcare
The practice of protecting electronic devices, networks, systems, and data from unauthorized access, theft, or damage by implementing various technologies and processes.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberwarfare: War Activities in Cyberspace
Specific application, practices and exercises with technical, social, psychological, economical, and organizational foundations aiming to protect and maintain cyberassets including both tangible ones such as computer systems and intangible ones such as information and networks.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Identity and Data Sovereignty: Redefining Global Information Flows
Cybersecurity is the practice of protecting digital systems, networks, and data from security threats, including cyberattacks and data breaches.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Curricular Guidelines
A computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the creation, operation, analysis, and testing of secure computer systems. It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries.
Full Text Chapter Download: US $37.50 Add to Cart
Internet Challenges and Safety of Children and Young People in Cyber Space
Also known as digital security, is the practice of protecting digital information, devices and resources. This includes personal information, accounts, files, photos, even money.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Risk: The Business Significance of Ongoing Tracking
Cybersecurity is the use of diverse technologies, methods, and controls to safeguard systems, networks, programs, devices as well as information from cyberattacks.
Full Text Chapter Download: US $37.50 Add to Cart
From Pen and Paper to Pixels: Challenges and Opportunities of Digital Diplomacy
In the context of digital diplomacy, cybersecurity refers to the measures and strategies employed to protect diplomatic communications and data from digital threats. This includes safeguarding sensitive information from unauthorized access, cyber espionage, and other forms of digital attacks that could compromise diplomatic missions.
Full Text Chapter Download: US $37.50 Add to Cart
A Three-Vector Approach to Blind Spots in Cybersecurity
The organization and collection of resources, processes, and structures used to protect cyberspace from occurrences that misalign de jure from de facto property rights.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
Full Text Chapter Download: US $37.50 Add to Cart
Sovereign Bureaucrats vs. Global Tech Companies: Ethical and Regulatory Challenges
Is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Risk: Assessment and Management
The practice of securing systems, networks, and programs from digital threats and attacks is known as cybersecurity. These cyberattacks are typically aimed at gaining access to, altering, or destroying sensitive data, extorting money from users, or disrupting normal corporate activities.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Security: Challenges, Solutions, and Future Directions: Navigating the Complexities of securing Cloud
Full Text Chapter Download: US $37.50 Add to Cart
Evaluating Cybersecurity Strategies in Africa
The protection of computer systems and networks from unauthorized exploitation, theft, damage to software, hardware, and electronic data.
Full Text Chapter Download: US $37.50 Add to Cart
Automotive Vehicle Security Standards, Regulations, and Compliance
A set of processes, practices, and technologies designed to protect, in the realm of cyberspace, the three tenets of information security: confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
The Electronic Hive Mind and Cybersecurity: Mass-Scale Human Cognitive Limits to Explain the “Weakest Link” in Cybersecurity
Acts taken, technologies created and deployed, policies written and enacted, to protect computer systems and networks against misuse, intrusion, and exploitation.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Deep Learning in Instructional Analysis, Design, Development, Implementation, and Evaluation (ADDIE)
The cybersecurity is the protection measures of the computer systems and networks from the cyberattack. The cyberattack includes the information disclosure, theft or damage to the hardware systems, the disruption or misdirection of the services associated with the system.
Full Text Chapter Download: US $37.50 Add to Cart
NERC CIP Standards: Review, Compliance, and Training
A set of processes, practices, and technologies designed to protect, in the realm of cyberspace, the three tenets of information security: confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
Imperatives of Risk Analysis and Asset Management on Cyber Security in a Technology-Driven Economy
Cybersecurity is the protection of internet-connected systems such as hardware, software, and data from cyber threats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
Full Text Chapter Download: US $37.50 Add to Cart
Auditor Evaluation and Reporting on Cybersecurity Risks
A set of processes, practices, and technologies designed to protect, on the realm of cyberspace, the three tenets of information security: confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
The Dark Side of Digital Culture
The defense and protection of computers, mobile devices, servers, and networks from criminal or unauthorized use of electronic data.
Full Text Chapter Download: US $37.50 Add to Cart
Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges
Cybersecurity is the practice of protecting and securing the IT systems, networks both wireless and wired, and software programs and hardware from digital attacks.
Full Text Chapter Download: US $37.50 Add to Cart
BYOD and the Evolving Workplace
It refers to the action taken to defend a person, organization, or nation as well as their computer information from online crimes or attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity and Business Continuity: An Essential Partnership in an Era of Digital Interactions
Refers to the protection of internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access.
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study on the United Arab Emirates (UAE) as a Digital Economy Exemplar
Cybersecurity is the practice of protecting computer systems and programs from digital attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Using the NIST Framework and COBIT 2019 in Offering Cybersecurity Consulting and Assurance Services
A set of processes, practices, and technologies designed to protect, on the realm of cyberspace, and the three tenets of information security: confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersex Trafficking: The Insidious Side of the Internet
Strategic scientific policies and practices of individuals and corporations to ensure the integrity of computer systems and networks from criminal activity. Such abuse ranges from lurking, stealing, manipulating, or outright controlling individual computers or networked systems. Any cyberattack that is successful can significantly paralyze business or an individual’s life. To resolve the instability or frozen nature of technology, hackers often seek to be compensated by a ransom, many times in cryptocurrency to ensure anonymity.
Full Text Chapter Download: US $37.50 Add to Cart
Service Organization Control (SOC) Reports and Their Usefulness
Security of computer-based systems. These systems employ a wide variety of methods such as encryption, firewalls, backup, and internal controls.
Full Text Chapter Download: US $37.50 Add to Cart
The Threat of Cyber Warfare in the SADC Region: The Case of Zimbabwe
The organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems from occurrences that misalign de jure from de facto property rights.
Full Text Chapter Download: US $37.50 Add to Cart
Implications of Artificial Intelligence-Driven Deepfakes for Cybersecurity and Regulation in Nigeria: Theorising for Cyberfakes and Cyberviolence
This term refers to the online peacefulness, safety, and harmony of state (nation), organisation and even individual. It also refers to the absolute absence, or a substantial degree of the guarantee of the absence of cyberviolence, ‘cyberaggression’, cyberconflict and other forms of online threat to a nation’s, organisation’s or individual entity’s overall sense of being secure from any phenomenon that may cause a great deal of panic, and fear, or the absence of peace, or the prevalence of war-like situation, or all of these in the cyberspace.
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Values and Responsibilities of Directors in the Digital Era
Security measures against various forms of cyberattacks on the business.
Full Text Chapter Download: US $37.50 Add to Cart
Arduousness in Technological Aspects of Remote Work
Cybersecurity is the protection of systems, networks, and data from digital threats and unauthorized access which involves threat prevention, risk management, access control, encryption, incident response, compliance, and awareness and training using key components such as firewalls, antivirus software, intrusion detection systems, risk management, access control, encryption, incident response, compliance, and employee training.
Full Text Chapter Download: US $37.50 Add to Cart
US Cybersecurity Laws and Regulations: Current Trends and Recommendations for Improvement
A combination of tools, policies, controls, and best practices to protect an organization’s assets such as people, data, technology, and processes.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity: The New Challenge of the Information Society
The art of ensuring the existence and continuity of the Information Society of a nation, guaranteeing and protecting, in Cyberspace, its information assets and critical infrastructure.
Full Text Chapter Download: US $37.50 Add to Cart
Global Wannacrypt Ransomware Attack: Tackling the Threat of Virtual Marauders
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity of Industrial Internet of Things
A set of techniques and algorithms to protect computers, networks, programs, and data from unauthorized access or exploitation, on criteria for maintaining usability, reliability, confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
Full Text Chapter Download: US $37.50 Add to Cart
Regulatory Approval and Challenges in the Digital Era
It encompasses the practice of protecting computer systems, networks, and data from unauthorized access, cyber attacks, and data breaches.
Full Text Chapter Download: US $37.50 Add to Cart
The Relationship Between Cybersecurity and Public Health
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity's Shaping of Wearable Healthcare Devices and Digital Marketing: What Leaders Need to Know
The practice of securing networks, systems, and other digital infrastructure from malicious attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Transforming Cities
The protection of electronic data from unauthorised or criminal activity.
Full Text Chapter Download: US $37.50 Add to Cart
Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things
Cybersecurity is the protection of computer systems and networks from the cyberattacks so that their hardware, software, or data are not disrupted or misdirected of the services that they provide.
Full Text Chapter Download: US $37.50 Add to Cart
Old Media, New Media, and Public Engagement with Science and Technology
A set of efforts to protect information systems from theft and unauthorized access to data and services the systems provide.
Full Text Chapter Download: US $37.50 Add to Cart
Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR
Freedom from potential compromise and potential harm stemming from unauthorized access to computers and computer networks.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Online Calling Cards and Professional Profiles in Cybersecurity From Social Media
The protection of digital information and related technologies against misuse, unauthorized access, or any form of compromise.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Awareness in Tourism Enterprises: Case of Turkish Manager Opinions
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Aligning Risk Perspectives Between the Chief Risk Officer and the Chief Information Security Officer
Cybersecurity refers to the protection of digital systems, networks, and data from unauthorized access, theft, damage, or disruption, ensuring the confidentiality, integrity, and availability of information in the digital realm.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Deepfake and Digital Citizenship: A Long-Term Protection Method for Children and Youth
The application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
Full Text Chapter Download: US $37.50 Add to Cart
Realizing a Multi-Layered Mobile Strategy for Underserved Areas for Cybersecurity Leadership
This is the application of diverse technologies, processes, procedures, and controls to safeguard systems, networks, programs, devices, and data from cyber attacks. Overall cyber security objective is to diminish the risk of cyber attacks and guard against the unsanctioned misuses of systems, networks, and technologies.
Full Text Chapter Download: US $37.50 Add to Cart
Leveraging OpenAI for Enhanced Multifactor Productivity in Chinese Businesses
The practice of protecting systems, networks, and programs from digital attacks aimed at accessing, changing, or destroying sensitive information.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR