You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.
Presents theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices. Provides recent, comprehensive coverage of all issues related to information security and ethics, as well as the opportunities, future challenges, and emerging trends related to this subject.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
Business practices are constantly evolving in order to meet growing customer demands. Evaluating the role of logistics and supply chain management skills or applications is necessary for the success of any organization or business. As market competition becomes more aggressive, it is crucial to evaluate ways in which a business can maintain a strategic edge over competitors. Supply Chain and Logistics Management: Concepts, Methodologies, Tools, and Applications is a vital reference source that centers on the effective management of risk factors and the implementation of the latest supply management strategies. It also explores the field of digital supply chain optimization and business transformation. Highlighting a range of topics such as inventory management, competitive advantage, and transport management, this multi-volume book is ideally designed for business managers, supply chain managers, business professionals, academicians, researchers, and upper-level students in the field of supply chain management, operations management, logistics, and operations research.
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.
Technological advances of the past decades have allowed organizations of all sizes to use information technology in all aspects of organizational management. This book presents more than 200 papers that address this growing corporate phenomena.
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
With the success of the widely acclaimed first volume of this series (Success and Pitfalls of IT Management), comes the second volume, Organizational Achievement and Failure in Information Technology Management. This book is a collection real-life cases that focus on both achievements attained with the successful utilization of information technology as well as failures suffered as a result of substandard use and management of IT resources in organizations. Cases deal with issues that affect a wide variety of organizations--large and small businesses, government organizations and educational institutions.This book also appeared as the journal, Annals of Cases on Information Technology: Applications and Management in Organizations, Volume 2.
From domestic to international settings, aid and assistance to less-developed areas has recently been bolstered by a boom in technological advances and new research. Regional Development: Concepts, Methodologies, Tools, and Applications presents a vital compendium of research detailing the latest case studies, architectures, frameworks, methodologies, and research on regional development. With over 100 chapters from authors from around the world, this three volume collection presents the most sophisticated research and developments from the field, relevant to researchers, academics, and practitioners alike. In order to stay abreast of the latest research, this book affords a vital look into regional development research.
Privacy and security concerns are at the forefront of research and critical study in the prevalence of information technology. Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy. This reference offers methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives.