The evolution of business in the cyber age : (Record no. 70168)

000 -LEADER
fixed length control field 05095cam a22005778i 4500
001 - CONTROL NUMBER
control field 9780429276484
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212012.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191029s2020 onc ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780429276484
-- (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0429276486
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000013818
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000013812
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000007282
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000007286
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000000450
-- (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000000451
-- (electronic bk. : PDF)
082 0# - CLASSIFICATION NUMBER
Call Number 658.4/78
245 04 - TITLE STATEMENT
Title The evolution of business in the cyber age :
Sub Title digital transformation, threats, and security /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Digital Workplace: The Human Interface / Debashis Ghosal and Shulagna Sarkar -- Helping Entrepreneurs and Small Businesses Make the Digital Transformation / Sugandha Soni Chopra -- Digital Transformation Using ICT Tools for Blended Teaching and Learning / S. Karkuzhali and S. Senthilkumar -- A Critical Analysis of E-HRM as a Strategic Capability Builder / B.C. Sinha -- 3Cs of International Market Penetration Through IMC: Culture,Change, and Connect / Jyoti Kukreja -- Internet of Things (IoT) and the Digital Business Environment: A Standpoint Inclusive Cyber Space, Cyber Crimes, and Cybersecurity / Anand Nayyar, Rudra Rameshwar, and Arun Solanki -- Big Data: Analytics, Technologies, and Applications / E. Sweetline Priya -- Cyber Threat Detection and Secured Alternative Technology: A Survey / S. Anitha and Hemanth G. Kumar -- Ransomware Evolution: Solving Ransomware Attack Challenges / Muhammad Ubale Kiru and Aman Jantan -- Global Challenges and Role of ICT in Empowerment of Teachers / Shweta Tripathi -- Cybersecurity and the Internet of Things: Anticipating the Leverage of Cyber Crimes with Interconnected Devices / A. Reyes-Menendez, J.R. Saura, and P. Palos-Sanchez -- Cloud Computing and Security / Dinesh Goyal and R.S. Rajput -- Unpacking Cybersecurity Trends / Vannie Naidoo and Rahul Verma.
520 ## - SUMMARY, ETC.
Summary, etc "This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and maintaining effective cyber protection. The book begins with a section on Digital Business Transformation, which includes chapters on tools for integrated marketing communications, human resource workplace digitation, the integration of the Internet of Things in the workplace, Big Data, and more. The technologies discussed aim to help businesses and entrepreneurs transform themselves to align with today's modern digital climate. In the section on Cyber Threat and Cyber Security, the volume goes on to address the growing challenges of keeping your online presence safe and secure, protecting your data along with that of your customers, detecting cyber attacks, and more. It considers the challenges of cyber safety in cloud computing and the interconnectedness of devices across platforms. The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security provides a wealth of information for those involved in the development and management of conducting business online as well as for those responsible for cyber protection and security. Faculty and students, researchers, and industry professionals will find much of value in this volume."--
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Computer networks
-- Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Management.
700 1# - AUTHOR 2
Author 2 Chowdhry, Divya Gupta,
700 1# - AUTHOR 2
Author 2 Verma, Rahul,
700 1# - AUTHOR 2
Author 2 Mathur, Manisha,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9780429276484
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Oakville, ON, Canada ;
-- Palm Bay, Florida, USA :
-- Apple Academic Press,
-- 2020.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Business enterprises
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Confidential business information
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information technology
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- BUSINESS & ECONOMICS / Development / Business Development
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- BUSINESS & ECONOMICS / Management
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- BUSINESS & ECONOMICS / Management Science

No items available.