ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cybersecurity Management: An Organizational and Strategic Approach

دانلود کتاب مدیریت امنیت سایبری: یک رویکرد سازمانی و استراتژیک

Cybersecurity Management: An Organizational and Strategic Approach

مشخصات کتاب

Cybersecurity Management: An Organizational and Strategic Approach

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 1487504969, 9781487504960 
ناشر: University of Toronto Press 
سال نشر: 2021 
تعداد صفحات: 432
[429] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 4 Mb 

قیمت کتاب (تومان) : 39,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Cybersecurity Management: An Organizational and Strategic Approach به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مدیریت امنیت سایبری: یک رویکرد سازمانی و استراتژیک نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مدیریت امنیت سایبری: یک رویکرد سازمانی و استراتژیک

مدیریت امنیت سایبری به وضعیت فعلی جرایم سایبری نگاه می‌کند و بررسی می‌کند که چگونه سازمان‌ها می‌توانند منابع و قابلیت‌هایی را توسعه دهند تا خود را برای محیط متغیر امنیت سایبری آماده کنند.


توضیحاتی درمورد کتاب به خارجی

Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment.



فهرست مطالب

Cover
Half-title page
Title page
Copyright page
Contents
List of Figures, Tables, and Boxes
Preface and Acknowledgments
Abbreviations
Part One: Mechanisms and Growth of Cybercrimes and the Current State of Cybersecurity
	1 Current States of Cybercrime and Cybersecurity
		1.1 Introduction
		1.2 The Nature of Cyberthreats and Key Challenges
		1.3 A Typology of Cyberoffenses
		1.4 Current State of Cybersecurity
		1.5 Chapter Summary and Conclusion
		1.6 Discussion Questions
		1.7 End-of-Chapter Case: Cybersecurity Issues Facing Power Grids in the US
	2 The Relationship and Differences between Privacy and Security
		2.1 Introduction
		2.2 Fair Information Practices and Privacy Concerns
		2.3 The GDPR: The Most Comprehensive Data Privacy Legislation
		2.4 Data Privacy Regulations in the Rest of the World
		2.5 Levels of Emphasis on Privacy and Security
		2.6 Chapter Summary and Conclusion
		2.7 Discussion Questions
		2.8 End-of-Chapter Case: France Issued the Biggest Fine under the GDPR against Google
	3 The Economics of Cybercrimes
		3.1 Introduction
		3.2 The Environment and Structure of Cybercrimes: The Vicious Circle
		3.3 A Cybercriminal’s Cost-benefit Calculus
		3.4 Combating Cybercrimes by Altering Their Cost-benefit Structure
		3.5 Chapter Summary and Conclusion
		3.6 Discussion Questions
		3.7 End-of-Chapter Case: Innovative Marketing Ukraine and the Scary Scareware Industry
	4 Increasing Returns, Externality, and Rise in Cybercrimes
		4.1 Introduction
		4.2 Increasing Returns and Feedback Loops in Cybercrimes
		4.3 Mechanisms Associated with Externality in Cybercrimes
		4.4 Chapter Summary and Conclusion
		4.5 Discussion Questions
		4.6 End-of-Chapter Case: Russian Business Network’s Underground Criminal Business Offerings
Part Two: Macro-level Factors Affecting Cybercrime and Cybersecurity
	5 Political, Cultural, Organizational, and Economic Factors Affecting Cybercrime and Cybersecurity
		5.1 Introduction
		5.2 Institutions’ Effects on Cybercrime and Cybersecurity
		5.3 Stock of Skills
		5.4 Institutional and Organizational Changes
		5.5 Cybersecurity and SMEs
		5.6 Chapter Summary and Conclusion
		5.7 Discussion Questions
		5.8 End-of-Chapter Case: Cybersecurity in Brazil
	6 Cybersecurity Policies and Strategies of Major Countries
		6.1 Introduction
		6.2 Key Components of National Cybersecurity Strategy
		6.3 Cybersecurity Policies and Strategies of Major Countries
		6.4 Comparison of Privacy and Cybersecurity Regulations of Major Countries
		6.5 Chapter Summary and Conclusion
		6.6 Discussion Questions
		6.7 End-of-Chapter Case: Israel’s National Cybersecurity Strategy
	7 Cybersecurity Issues in International Relations and the Global Political System
		7.1 Introduction
		7.2 International Legal Regimes and Institutional Frameworks
		7.3 Cybersecurity-related Initiatives at the UN
		7.4 Critical Issues and Current Sources of Disagreement among Nations
		7.5 Nations’ Strategic Policy Choices to Deal with Cyberconflicts
		7.6 Chapter Summary and Conclusion
		7.7 Discussion Questions
		7.8 End-of-Chapter Case: US–China Relations in Cybersecurity
Part Three: Strategic and Organizational Issues Associated with Cybersecurity
	8 Corporate Cybersecurity Strategy
		8.1 Introduction
		8.2 Goals, Performance, and Control Measures in Cybersecurity Strategy
		8.3 The First Principle of Cybersecurity
		8.4 Various Types of Resources in the Context of Cybersecurity Strategies
		8.5 Mapping Cybersecurity Responses to Potential Cyberthreats
		8.6 Chapter Summary and Conclusion
		8.7 Discussion Questions
		8.8 End-of-Chapter Case: Cybersecurity Strategy of Petrobras
	9 Cybersecurity and Marketing: Illustration of Advertising and Branding
		9.1 Introduction
		9.2 Cybersecurity and Brand Equity
		9.3 PPC Advertising and Click Fraud
		9.4 What Can Marketers Do?
		9.5 Chapter Summary and Conclusion
		9.6 Discussion Questions
		9.7 End-of-Chapter Case: Rove Digital’s Victimization of Advertisers
	10 Cybersecurity in Human Resources Management
		10.1 Introduction
		10.2 Attracting, Retaining, and Motivating a High-quality Cybersecurity Workforce
		10.3 Influence of Promising and Exemplary Cybersecurity Practices
		10.4 General Environment
		10.5 Firm Characteristics
		10.6 Understanding of Cybersecurity by Board Members and C-level Executives
		10.7 Improving Cyberdefense Capabilities of and Controlling Deviant Behaviors of the Workforce
		10.8 Gender-related Issues in Cybersecurity
		10.9 Chapter Summary and Conclusion
		10.10 Discussion Questions
		10.11 End-of-Chapter Case: Defective Human Resources Policies Weakened Home Depot’s Cybersecurity
Part Four: Privacy and Security Issues Associated with New and Evolving ICTs and Systems
	11 Social Media
		11.1 Introduction
		11.2 Impacts on Businesses and Individuals
		11.3 Technological Environment
		11.4 Institutional Environment
		11.5 Social Media Companies’ Efforts to Fight Cybercrimes
		11.6 Chapter Summary and Conclusion
		11.7 Discussion Questions
		11.8 End-of-Chapter Case: The Facebook–Cambridge Analytica Data Scandal
	12 Cloud Computing
		12.1 Introduction
		12.2 Institutional Issues in the Cloud Industry and Market
		12.3 Institutional Forces and Power Dynamics
		12.4 Chapter Summary and Conclusion
		12.5 Discussion Questions
		12.6 End-of-Chapter Case: Cloud Storage Firm Dropbox Gets Hacked
	13 Big Data
		13.1 Introduction
		13.2 Businesses’ and Consumers’ Perceptions of and Responses to Big Data
		13.3 Characteristics of Big Data in Relation to Privacy and Security
		13.4 5G Cellular Services and Big Data
		13.5 Chapter Summary and Conclusion
		13.6 Discussion Questions
		13.7 End-of-Chapter Case: Equifax Becomes a Victim of a Big Hack
	14 Smart Cities and the Internet of Things
		14.1 Introduction
		14.2 Smart Cities
		14.3 The Internet of Things
		14.4 Measures Taken by Industry Trade Groups and Cybersecurity Firms
		14.5 Blockchain’s Role in IoT Security
		14.6 The Role of Artificial Intelligence in IoT Security
		14.7 Chapter Summary and Conclusion
		14.8 Discussion Questions
		14.9 End-of-Chapter Case: Criminals Use IoT Devices to Attack Dyn
	15 Artificial Intelligence
		15.1 Introduction
		15.2 The Use of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity
		15.3 Artificial Intelligence and Cyberoffenders
		15.4 The Use of Artificial Intelligence in Surveillance by Government Agencies
		15.5 Chapter Summary and Conclusion
		15.6 Discussion Questions
		15.7 End-of-Chapter Case: Google Ramps Up AI Efforts in CS
Part Five: Conclusion, Recommendations, and the Way Forward
	16 Conclusion, Recommendations, and the Way Forward
		16.1 Introduction
		16.2 The Future of Cybercrime and Cybersecurity
		16.3 Implications for Businesses
		16.4 Implications for Consumers
		16.5 Implications for Policy-makers
		16.6 Final Thoughts
Notes
Index




نظرات کاربران