Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (3 Volumes)

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (3 Volumes)

Indexed In: SCOPUS
Release Date: May, 2018|Copyright: © 2018 |Pages: 1711
DOI: 10.4018/978-1-5225-5634-3
ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
Hardcover:
Available
$945.00
TOTAL SAVINGS: $945.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$850.50
List Price: $945.00
10% Discount:-$94.50
TOTAL SAVINGS: $94.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$1,140.00
TOTAL SAVINGS: $1,140.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise.

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Cloud Security
  • Cryptography
  • Cyber Warfare
  • Cyber-Criminal Profiling
  • Data Breaches
  • Mobile Security
  • Online Threat Protection
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Information Resources Management Association (IRMA) is a research-based professional organization dedicated to advancing the concepts and practices of information resources management in modern organizations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals. IRMA brings together researchers, practitioners, academicians, and policy makers in information technology management from over 50 countries.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.