The evolution of business in the cyber age : (Record no. 70168)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05095cam a22005778i 4500 |
001 - CONTROL NUMBER | |
control field | 9780429276484 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711212012.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 191029s2020 onc ob 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780429276484 |
-- | (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 0429276486 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000013818 |
-- | (electronic bk. : Mobipocket) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000013812 |
-- | (electronic bk. : Mobipocket) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000007282 |
-- | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000007286 |
-- | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000000450 |
-- | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000000451 |
-- | (electronic bk. : PDF) |
082 0# - CLASSIFICATION NUMBER | |
Call Number | 658.4/78 |
245 04 - TITLE STATEMENT | |
Title | The evolution of business in the cyber age : |
Sub Title | digital transformation, threats, and security / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Digital Workplace: The Human Interface / Debashis Ghosal and Shulagna Sarkar -- Helping Entrepreneurs and Small Businesses Make the Digital Transformation / Sugandha Soni Chopra -- Digital Transformation Using ICT Tools for Blended Teaching and Learning / S. Karkuzhali and S. Senthilkumar -- A Critical Analysis of E-HRM as a Strategic Capability Builder / B.C. Sinha -- 3Cs of International Market Penetration Through IMC: Culture,Change, and Connect / Jyoti Kukreja -- Internet of Things (IoT) and the Digital Business Environment: A Standpoint Inclusive Cyber Space, Cyber Crimes, and Cybersecurity / Anand Nayyar, Rudra Rameshwar, and Arun Solanki -- Big Data: Analytics, Technologies, and Applications / E. Sweetline Priya -- Cyber Threat Detection and Secured Alternative Technology: A Survey / S. Anitha and Hemanth G. Kumar -- Ransomware Evolution: Solving Ransomware Attack Challenges / Muhammad Ubale Kiru and Aman Jantan -- Global Challenges and Role of ICT in Empowerment of Teachers / Shweta Tripathi -- Cybersecurity and the Internet of Things: Anticipating the Leverage of Cyber Crimes with Interconnected Devices / A. Reyes-Menendez, J.R. Saura, and P. Palos-Sanchez -- Cloud Computing and Security / Dinesh Goyal and R.S. Rajput -- Unpacking Cybersecurity Trends / Vannie Naidoo and Rahul Verma. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and maintaining effective cyber protection. The book begins with a section on Digital Business Transformation, which includes chapters on tools for integrated marketing communications, human resource workplace digitation, the integration of the Internet of Things in the workplace, Big Data, and more. The technologies discussed aim to help businesses and entrepreneurs transform themselves to align with today's modern digital climate. In the section on Cyber Threat and Cyber Security, the volume goes on to address the growing challenges of keeping your online presence safe and secure, protecting your data along with that of your customers, detecting cyber attacks, and more. It considers the challenges of cyber safety in cloud computing and the interconnectedness of devices across platforms. The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security provides a wealth of information for those involved in the development and management of conducting business online as well as for those responsible for cyber protection and security. Faculty and students, researchers, and industry professionals will find much of value in this volume."-- |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Computer networks |
-- | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Management. |
700 1# - AUTHOR 2 | |
Author 2 | Chowdhry, Divya Gupta, |
700 1# - AUTHOR 2 | |
Author 2 | Verma, Rahul, |
700 1# - AUTHOR 2 | |
Author 2 | Mathur, Manisha, |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9780429276484 |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Oakville, ON, Canada ; |
-- | Palm Bay, Florida, USA : |
-- | Apple Academic Press, |
-- | 2020. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
520 ## - SUMMARY, ETC. | |
-- | Provided by publisher. |
588 ## - | |
-- | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Business enterprises |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Confidential business information |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information technology |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | BUSINESS & ECONOMICS / Development / Business Development |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | BUSINESS & ECONOMICS / Management |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | BUSINESS & ECONOMICS / Management Science |
No items available.