7 results (0,14109 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Handbook of e-Business Security

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership is a must read for anyone involved in international business. It enables beginners to avoid common pitfalls and seasoned executives will recognize many of their own mistakes and benefit from the frameworks Dr. Kraljevic provides. — Professor Sibrandes Poppema President University of Groningen NetherlandsI just cannot stop recommending this book to ever so many people—my academic colleagues industry colleagues friends in the government former students students young CEOs of start-ups that I mentor and my media friends. The book is very special deep with several gems of ideas told in absorbing narrative; neither a text book nor a cook book but a candid sincere and extremely effective set of real world lessons for so many global citizens. Dr. Kraljevic uses personal examples from across continents in diverse industry settings. All I can say is this: Go grab the book on a Thursday night and you will have a wonderful weekend reading this amazing book. — Professor S. Sadagopan Director International Institute of Information Technology of Bangalore India Everything I know about international markets I owe it to Zlática. — Sue Payne Former ExxonMobil Area Manager U. S. & Mexico As the global village rapidly expands understanding borderless leadership becomes a prerequisite for international success in this 21st century. Kraljevic brings her vast and unique worldly experiences to open your mind with practical treasures thoughtful how-to models and conceptual insights. Find out about the human fractal on your journey to becoming a borderless leader. — Lane Sloan Former President Shell Chemical Company USA Studies consistently show that international partnerships between organizations fail to generate expected results at a significant cost. The leading cause behind this failure is lack of trust among people at all levels within organizations. Borderless Leadership explores the disparity that exists between the ways that the West and other cultures conduct business. The book’s premise is that if one cannot control the events or circumstances one must learn how to control reactions to new environments. Using real-life examples the book illustrates how to build trust and rapport with business partners across borders and establish relationships that help businesses grow. The book is about achieving success with and through total strangers as you progress from awareness to understanding and from understanding to acquiring internalizing and applying new knowledge so you bring your approach to life up to date. Only then can you transform obstacles into unsuspected opportunities that will have a positive impact on your personal and business success. | Borderless Leadership Global Skills for Personal and Business Success

GBP 42.99
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

Developing the Intuitive Executive Using Analytics and Intuition for Success

Developing the Intuitive Executive Using Analytics and Intuition for Success

The leading traits of executives often include creativity and innovation. Research shows that intuition can significantly enhance these traits. Developing intuitive executives and honing intuition coupled with the ability to apply data and evidence to inform decision making is the focus of Developing the Intuitive Executive: Using Analytics and Intuition for Success. Some researchers call the complement of applying data analytics to intuition as quantitative intuition rational intuition or informed intuition. Certainly in today's data-driven environment analytics plays a key role in executive decision-making. However an executive’s many years of experiential learning are not formally considered as part of the decision-making process. Learning from both failures and successes can help fine-tune intuitive awareness—what this book calls intuition-based decision-making. Research also shows that many executives do not trust the internal data quality in their organizations and so they rely on their intuition rather than strictly on data. This book presents the work of leading researchers worldwide on intuition in the management and executive domain. Their chapters cover key issues trends concepts techniques and opportunities for applying intuition as part of the executive decision-making process. Highlights include: Using intuition to manage new opportunities Intuition in medicine Rules based on intuition Balancing logic and intuition in decision-making Smart heuristics to manage complexity Intuition and competitiveness Intuitive investment decision-making across cultures Showing how intuition in executive decision-making should play an important role this book enables managers to complement their knowledge gained from experience with analytics to improve decision-making and business success. | Developing the Intuitive Executive Using Analytics and Intuition for Success

GBP 44.99
1

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

The Industry 4. 0 revolution is changing the world around us. Artificial intelligence and machine learning automation and robotics big data Internet of Things augmented reality virtual reality and creativity are the tools of Industry 4. 0. Improved collaboration is seen between smart systems and humans which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4. 0 Applications with Blockchain examines the role of IoT in Industry 4. 0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications architecture technologies tools and programming languages. It then examines blockchain and cybersecurity as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4. 0 systems The evolution of the Industrial Internet of Things (IIoT) its proliferation and market share and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT) including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications including smart contracts transferring financial instruments and Public Key Infrastructure An overview of the structure and working of a blockchain including the types evolution benefits and applications of blockchain to industries A framework of technologies designed to shield networks computers and data from malware vulnerabilities and unauthorized activities An explanation of the automation system employed in industries along with its classification functionality flexibility limitations and applications

GBP 115.00
1