Warning! Do NOT Download Without a VPN!
Your IP Address is . Location is Planet Earth
Your Internet Provider and Government can track your download activities! Hide your IP ADDRESS with a VPN!
We strongly recommend using a VPN service to anonymize your torrent downloads. It's FREE!
START YOUR FREE TRIAL NOW!
|
Vajjhala N Cybersecurity For Decision Makers 2023 |
---|
Torrent Details |
---|
Description |
---|
Textbook in PDF format
This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in Computer Science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant and supportive to teaching as well as research.
In Chapter “Cybersecurity Attack Case Studies, Lessons Learned,” D.V. Manjula, Aisshwarya Nallamilli state that the frequency of cyberattacks is rising gradually as technology advances. The authors argue that these attacks cause signifcant damage to businesses. The authors give examples of several cybersecurity measures currently used by organizations, including multi-factor authentication (MFA), virtual private networks (VPNs), frewalls, and other generic security measures. The authors also illustrate several case studies of cybersecurity attacks that will help decision makers in organizations. The chapter’s goal is to ensure that organizations learn from previous case studies of cyberattacks and avoid repeating similar attacks. This chapter should help decision makers to develop policies and prepare for potential cyberattacks.
Preface
1 Why Cyberattacks Disrupt Society and How to Mitigate Risk
2 Forms, and Remedies of Cyberbullying on Social Media Platforms: A brief Philosophical Perspective
3 Cybersecurity and Human Factors: A Literature Review
4 An Introduction to Cybercrime and Cybersecurity: The Whys and Whos of Cybersecurity
6 Towards a Cybersecurity Awareness Program for Non-Technical Audiences in Malaysia
7 Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective
8 Intelligent Named Entity-Based Cybercrime Recognition System for Social Media Network Platforms
9 A Case Study on Zonal Analysis of Cybercrimes Over a Decade in India
10 Taming the Confuence of Space Systems and Cybersecurity
11 Regulating Cyber-Physical Systems for Safety Consequences
12 Mapping the State of the Art: Artifcial Intelligence for Decision Making in Financial Crime
13 Understanding and Measuring the Impact of Cyberattacks on Businesses: A Systematic Literature Review
14 Problems and Ethical Issues in Cybersecurity Today: Some Critical Readings
15 An Empirical Investigation of Psychological Factors Affecting Compliance with Information Security Organizational Policies
16 Nexus between Banking Cybersecurity Breaches, Cyber Vulnerabilities, and Kidnap for Ransom in Nigeria: A Comparative Analysis of Kaduna and Abuja Metropolis, Nigeria
17 SME Cybersecurity Misconceptions: A Guide for Decision Makers
18 Rethinking the Impact of Informal Organizational Rules on Organizational Cybersecurity
19 Ethical Aspects of Cybersecurity in E-Commerce
20 Cybersecurity in Healthcare
21Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems
22 Building Cybersecurity Capacity Through Education, Awareness, and Training
23 Cybersecurity Awareness: Prerequisites for Strategic Decision Makers
Discussion |
---|
Comments 0
There are no comments yet.
Post Your Comment
To post your comment to this torrent, please login to our site.
Files in this torrent |
---|
FILENAME | SIZE | |
---|---|---|
![]() | Vajjhala N. Cybersecurity for Decision Makers 2023.pdf | 10.3 MB |
Alternative Torrents for 'Vajjhala Cybersecurity for Decision Makers'. |
---|
There are no alternative torrents found.