Book description
This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of cybersecurity.Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cybersecurity.
This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.
Table of contents
- Cover
- Halftitle Page
- Title Page
- Copyright Page
- Contents
- Acknowledgments
- Chapter 1 Introduction to Cybersecurity
- Chapter 2 Theory of Cybersecurity
- Chapter 3 Emerging Technologies for the Theories of Cybersecurity
- Chapter 4 Innovative Ideologies of the Theories of Blockchain Technologies
- Chapter 5 ICTs Introduced into the Applications of the Concept of Digital Financial Services and Financial Inclusion
- Chapter 6 The Various Steps of the Processes of Building Cyber Secure Applications
- Chapter 7 The Types of Risks that Emerge With the Concept of Fraud
- Chapter 8 Consumer Protection and Financial Inclusion
- Chapter 9 Solar Flares and Quantum Neural Networks
- About the Author
- Index
Product information
- Title: The Business of Cybersecurity
- Author(s):
- Release date: May 2019
- Publisher(s): Business Expert Press
- ISBN: 9781948976190
You might also like
book
Cybersecurity Law
This book gives insight into the legal aspects of data ownership in the 21st century. With …
book
A Leader's Guide to Cybersecurity
Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep …
book
How Cyber Security Can Protect Your Business - A guide for all stakeholders
How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective …
book
Cyber Security: Essential Principles to Secure Your Organisation
Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber …