詳細書目資料

2
0
0
0
0

Blockchain and other emerging technologies for digital business strategies [electronic resource]

  • 其他作者:
  • 其他題名:
    • Advanced sciences and technologies for security applications.
  • 出版: Cham : Springer International Publishing :Imprint: Springer
  • 叢書名: Advanced sciences and technologies for security applications,
  • 主題: Computer security. , Blockchains (Databases) , Business Strategy and Leadership. , Data and Information Security. , Emerging Technologies. , Artificial Intelligence.
  • ISBN: 9783030982256 (electronic bk.) 、 9783030982249 (paper)
  • FIND@SFXID: CGU
  • 資料類型: 電子書
  • 內容註: 1. Digital leadership models, strategies and traits -- 2. Social Media, Challenges and Strategies in 5G and 6G -- 3. Cyber Security defence including Ransomware attacks for Small and Medium-Sized Businesses in the digital economy -- 4. Information Governance, security and e-Governance -- 5. The role of AR/ VR and Holographic technology in corporate decision making -- 6. 5G in vertical market transformation -- 7. IoT, IoMT, IIoT and IoNT -- 8. Blockchain and smart contracts -- 9. Zero trust security strategies and guideline -- 10. Predicting Algorithms shaping outcomes through manipulation.
  • 摘要註: This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem. The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master's degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
  • 讀者標籤:
  • 引用連結:
  • Share:
  • 系統號: 005514004 | 機讀編目格式
  • 館藏資訊

    回到最上