Enterprise Cybersecurity in Digital Business最新文献

筛选
英文 中文
Cyber Risk 网络风险
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-3
A. Evans
{"title":"Cyber Risk","authors":"A. Evans","doi":"10.4324/9781003052616-3","DOIUrl":"https://doi.org/10.4324/9781003052616-3","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129019287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Asset Cyber Risk Modeling and Scoring 数字资产网络风险建模与评分
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-29
A. Evans
{"title":"Digital Asset Cyber Risk Modeling and Scoring","authors":"A. Evans","doi":"10.4324/9781003052616-29","DOIUrl":"https://doi.org/10.4324/9781003052616-29","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Incident Response 网络安全事件响应
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-24
A. Evans
{"title":"Cybersecurity Incident Response","authors":"A. Evans","doi":"10.4324/9781003052616-24","DOIUrl":"https://doi.org/10.4324/9781003052616-24","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131642433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Tools 网络安全工具
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-17
A. Evans
{"title":"Cybersecurity Tools","authors":"A. Evans","doi":"10.4324/9781003052616-17","DOIUrl":"https://doi.org/10.4324/9781003052616-17","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Policies 网络安全政策
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-16
A. Evans
{"title":"Cybersecurity Policies","authors":"A. Evans","doi":"10.4324/9781003052616-16","DOIUrl":"https://doi.org/10.4324/9781003052616-16","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Organizational Cyber Maturities 组织网络成熟度
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-14
A. Evans
{"title":"Organizational Cyber Maturities","authors":"A. Evans","doi":"10.4324/9781003052616-14","DOIUrl":"https://doi.org/10.4324/9781003052616-14","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensics Methods 数字取证方法
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-25
A. Evans
{"title":"Digital Forensics Methods","authors":"A. Evans","doi":"10.4324/9781003052616-25","DOIUrl":"https://doi.org/10.4324/9781003052616-25","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber 网络
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.5040/9781474218573.0072
A. Evans
{"title":"Cyber","authors":"A. Evans","doi":"10.5040/9781474218573.0072","DOIUrl":"https://doi.org/10.5040/9781474218573.0072","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126085159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CISO Strategies CISO策略
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-37
Ariel Evans
{"title":"CISO Strategies","authors":"Ariel Evans","doi":"10.4324/9781003052616-37","DOIUrl":"https://doi.org/10.4324/9781003052616-37","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Consequences 网络安全的后果
Enterprise Cybersecurity in Digital Business Pub Date : 2022-02-01 DOI: 10.4324/9781003052616-5
A. Evans
{"title":"Cybersecurity Consequences","authors":"A. Evans","doi":"10.4324/9781003052616-5","DOIUrl":"https://doi.org/10.4324/9781003052616-5","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"368 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120942535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信