Descript |
PDFs (408 p.) : ill |
Note |
Includes bibliographical references and index |
|
An exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap |
|
Restricted to subscribers or individual electronic text purchasers |
|
"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher |
|
Also available in print |
|
Mode of access: World Wide Web |
|
Description based on title screen (IGI Global, viewed 01/07/2017) |
Subject |
Computer networks -- Security measures
|
|
Cloud computing -- Security measures
|
|
Cloud based services
|
|
Cyber crime
|
|
Data breaches
|
|
Electronic data diffusion
|
|
Internet of things (IoT)
|
|
Robotics
|
Alt Author |
Moore, Michelle, editor
|
|