📖[PDF] Cybersecurity and Privacy – Bridging the Gap by Samant Khajuria | Perlego
Get access to over 750,000 titles
Start your free trial today and explore our endless library.
Join perlego now to get access to over 750,000 books
Join perlego now to get access to over 750,000 books
Join perlego now to get access to over 750,000 books
Join perlego now to get access to over 750,000 books
Cybersecurity and Privacy – Bridging the Gap
Cybersecurity and Privacy – Bridging the Gap
📖 Book - PDF

Cybersecurity and Privacy – Bridging the Gap

Samant Khajuria, Lene Sørensen, Knud Erik Skouby
shareBook
Share book
pages
238 pages
language
English
format
PDF
unavailableOnMobile
Only available on web
📖 Book - PDF

Cybersecurity and Privacy – Bridging the Gap

Samant Khajuria, Lene Sørensen, Knud Erik Skouby
Book details
Table of contents
Citations

About This Book

The huge potential in future connected services hinges on the precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is appearing increasingly on the agenda at both the company and individual level. Cybersecurity and Privacy – Bridging the Gap addresses two very complex fields of the digital world: cybersecurity and privacy. These multifaceted and multidisciplinary issues are usually understood and valued differently by different individuals, data holders, and legal bodies, but a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between industry and academia by addressing the views from both areas on the subject. Technical topics discussed in the book include: •Cybersecurity
•Encryption
•Privacy policy
•Trust
•Security and Internet of Things
•Botnets
•Data risks
•Cloudbased Services
•Visualization

Read More

Information

Publisher
River Publishers
Year
2017
ISBN
9788793519657
Topic
Computer Science
Subtopic
Cyber Security

Table of contents