MARC details
000 -LIDER |
fixed length control field |
04856nam a22006375i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-031-52272-7 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250516160023.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240417s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031522727 |
-- |
978-3-031-52272-7 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
Q334-342 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TA347.A78 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UYQ |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM004000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UYQ |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.3 |
Edition number |
23 |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity and Artificial Intelligence |
Medium |
[electronic resource] : |
Remainder of title |
Transformational Strategies and Disruptive Innovation / |
Statement of responsibility, etc. |
edited by Hamid Jahankhani, Gordon Bowen, Mhd Saeed Sharif, Osama Hussien. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2024. |
264 #1 - |
-- |
Cham : |
-- |
Springer Nature Switzerland : |
-- |
Imprint: Springer, |
-- |
2024. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
VI, 326 p. 62 illus., 59 illus. in color. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Advanced Sciences and Technologies for Security Applications, |
International Standard Serial Number |
2363-9466 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Cybersecurity Strategy -- 2. Artificial Intelligence Innovations -- 3. Cybersecurity and Healthcare -- 4. Artificial Intelligence Implementation -- 5. Emerging technologies to manage cybersecurity -- 6. Artificial Intelligence and Healthcare -- 7. Intelligent Decision making within cybersecurity -- 8. SDGs and CSR to embed cybersecurity in society -- 9. Cybersecurity leadership - ethical leadership -- 10. Government role and policies for cybersecurity - evaluation of the main governments approach -- 11. Countering cybersecurity threats -- 12. Impact case analysis of 2-3 cybersecurity cases -- 13. Cybersecurity governance -- 14. Legal perspective of cybersecurity laws -- 14. Cybersecurity and database integrity -- 15. Building international alliances in cybersecurity - political and regulatory requirements -- 16. Cybersecurity and behavioural changes. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes - which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies. Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments' approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Owner |
UABC ; |
Method of acquisition |
Perpetuidad |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Political science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Criminology. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Strategic planning. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Leadership. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Governance and Government. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Crime Control and Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Business Strategy and Leadership. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Jahankhani, Hamid. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Bowen, Gordon. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Sharif, Mhd Saeed. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hussien, Osama. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031522710 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031522734 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031522741 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Advanced Sciences and Technologies for Security Applications, |
-- |
2363-9466 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Public note |
Libro electrónico |
Uniform Resource Identifier |
http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-52272-7 |
912 ## - |
-- |
ZDB-2-SCS |
912 ## - |
-- |
ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Libro Electrónico |