Effective Cybersecurity Operations for Enterprise-Wide Systems

Effective Cybersecurity Operations for Enterprise-Wide Systems

  • Adedoyin, Festus Fatai
  • Christiansen, Bryan
Publisher:IGI GlobalISBN 13: 9781668490204ISBN 10: 166849020X

Paperback & Hardcover deals ―

Amazon IndiaGOFlipkart GOSnapdealGOSapnaOnlineGOJain Book AgencyGOBooks Wagon₹10,833Book ChorGOCrosswordGODC BooksGO

e-book & Audiobook deals ―

Amazon India GOGoogle Play Books ₹192Audible GO

* Price may vary from time to time.

* GO = We're not able to fetch the price (please check manually visiting the website).

Know about the book -

Effective Cybersecurity Operations for Enterprise-Wide Systems is written by Adedoyin, Festus Fatai and published by IGI Global. It's available with International Standard Book Number or ISBN identification 166849020X (ISBN 10) and 9781668490204 (ISBN 13).

Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and Wi-Fi, and the growth of "smart" devices, which constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Its primary goal is to ensure the dependability, integrity, and data privacy of enterprise-wide systems in an era of increasing cyberattacks from around the world. Effective Cybersecurity Operations for Enterprise-Wide Systems examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many publications do not include an enterprise-wide perspective of the research. The book provides such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others. Covering topics including cybersecurity in international business, risk management, artificial intelligence, social engineering, spyware, decision support systems, encryption, cyber-attacks and breaches, ethical hacking, transaction support systems, phishing, and data privacy, it is designed for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.