LDR | | 03788cmm u2200541 i 4500 |
001 | | 000000321490 |
003 | | OCoLC |
005 | | 20230613110942 |
006 | | m d | | |
007 | | cr ||||||||||| |
008 | | 200214s2021 paua ob 001 0 eng |
010 | |
▼a 2020006981 |
020 | |
▼a 9781799843405
▼q electronic book |
020 | |
▼a 1799843408
▼q electronic book |
020 | |
▼z 9781799843399
▼q hardcover |
020 | |
▼z 9781799854876
▼q paperback |
035 | |
▼a 2569988
▼b (N$T) |
035 | |
▼a (OCoLC)1156421473 |
040 | |
▼a DLC
▼b eng
▼e rda
▼c DLC
▼d OCLCO
▼d IGIGL
▼d N$T
▼d YDX
▼d 248032 |
042 | |
▼a pcc |
049 | |
▼a MAIN |
050 | 04 |
▼a QA76.9.A25
▼b T727 2021 |
082 | 00 |
▼a 005.8
▼2 23 |
245 | 00 |
▼a Transdisciplinary perspectives on risk management and cyber intelligence /
▼c Luisa Dall'Acqua, Irene Maria Gironacci [editors].
▼h [electronic resource] |
260 | |
▼a Hershey, PA :
▼b Information Science Reference, an imprint of IGI Global,
▼c [2021] |
300 | |
▼a 1 online resource (xxiv, 273 pages) :
▼b illustrations (chiefly color). |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b n
▼2 rdamedia |
338 | |
▼a online resource
▼b nc
▼2 rdacarrier |
490 | 1 |
▼a Advances in information security, privacy, and ethics (AISPE) book series |
500 | |
▼a "Premier Reference Source" -- Front cover. |
504 | |
▼a Includes bibliographical references and index. |
505 | 0 |
▼a Section 1. Strategies. Chapter 1. Cognitive science, orientism management (OM), and intelligence analysis ; Chapter 2. Homegrown terrorism: an analysis of its effects on PESTLE factors ; Chapter 3. Exploring cognitive biases, groupthink, and polythink syndrome in security decisions and business outcomes ; Chapter 4. Intel cycle for private professionals: acquisition, management, and dissemination of information ; Chapter 5. Tactical art of risk management in the history of Ninja ; Chapter 6. Private intel for corporate protection -- Section 2. Technologies. Chapter 7. Agent-based approach for monitoring risks in software development projects ; Chapter 8. State of the art of extended reality tools and applications in business ; Chapter 9. Literature review of recommendation systems ; Chapter 10. Augmented and emerging transformative interactions with technology: learning in post humanism ; Chapter 11. Origin of cyber warfare and how the espionage changed: a historical overview -- Section 3. Study cases. Chapter 12. General George S. Patton and our climate crisis: the stories people need building new myths for a sustainable earth ; Chapter 13. Lobbying a crucial mechanism for NGOs to obtain funding for poverty alleviation programs in Africa ; Chapter 14. Dichotomy and violent student protests: perceptions from students. |
520 | |
▼a "This book explores perspectives and approaches to the intelligence analysis and risk management"--
▼c Provided by publisher. |
588 | |
▼a Description based on online resource; title from digital title page (viewed on October 02, 2020). |
590 | |
▼a Master record variable field(s) change: 050 |
650 | 0 |
▼a Cyber intelligence (Computer security) |
650 | 0 |
▼a Risk management. |
650 | 0 |
▼a Cyberterrorism. |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a Dall'Acqua, Luisa,
▼d 1962-,
▼e editor. |
700 | 1 |
▼a Gironacci, Irene M.,
▼d 1988-,
▼e editor. |
776 | 08 |
▼i Print version:
▼t Transdisciplinary perspectives on risk management and cyber intelligence
▼d Hershey, PA : Information Science Reference, an imprint of IGI Global, [2021]
▼z 9781799843399
▼w (DLC) 2020006980 |
830 | 0 |
▼a Advances in information security, privacy, and ethics (AISPE) book series. |
856 | 40 |
▼3 EBSCOhost
▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2569988 |
938 | |
▼a IGI Global
▼b IGIG
▼n 00244424 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 2569988 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |