Reference Hub1
Indices1
Cybersecurity Breaches and Issues Surrounding Online Threat Protection

Cybersecurity Breaches and Issues Surrounding Online Threat Protection

Copyright: © 2017 |Pages: 408
ISBN13: 9781522519416|ISBN10: 1522519416|EISBN13: 9781522519423
DOI: 10.4018/978-1-5225-1941-6
Cite Book Cite Book

MLA

Moore, Michelle, editor. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1941-6

APA

Moore, M. (Ed.). (2017). Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global. https://doi.org/10.4018/978-1-5225-1941-6

Chicago

Moore, Michelle, ed. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1941-6

Export Reference

Mendeley
Favorite Full-Book Download

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats.

Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
This section explores and identifies various issues and concerns specific to cybersecurity and some of the policies that accompany them. This section goes into detail with some chapters focusing on economic factors as well as across...
Identifying Cybersecurity and Its Threats
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Cybercrime  (pages 95-95)
This section discusses various breaches, investigations, and crimes that relate to cyber threats and instances. The focus is primarily on detection and analyzing at both the domestic and international areas.
Cybercrime
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Into the Cloud  (pages 197-197)
This section focuses on the User-End and deploying cloud bases security services through applications, data centers and other enterprise entities.
Into the Cloud
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.