| 000 | 02909cam a22003018i 4500 | ||
|---|---|---|---|
| 005 | 20250827140028.0 | ||
| 008 | 250808s2024 enk b 001 0 eng | ||
| 020 |
_a9781032259574 _q(hardback) |
||
| 020 |
_a9781032259581 _q(paperback) |
||
| 020 |
_z9781003285854 _q(ebook) |
||
| 050 | 0 | 0 |
_aHD38.7 _b.C93 _y2024 |
| 245 | 0 | 0 |
_aCyber security and business intelligence : _binnovations and machine learning for cyber risk management / _cedited by Mohammad Zoynul Abedin and Petr Hajek. |
| 264 | 1 |
_aAbingdon, Oxon ; _aNew York, NY : _bRoutledge, _c2024. |
|
| 300 | _axii, 222 p. | ||
| 490 | 0 | _aRoutledge studies in innovation, organizations and technology | |
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a"To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master's degree students and Ph.D. researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those on cyber risk management datasets. It will also leverage real-world financial instances to practice business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, reduce data breaches and cyber-attack vulnerabilities"-- _cProvided by publisher. |
||
| 650 | 0 |
_aBusiness intelligence _95840 |
|
| 650 | 0 |
_aComputer security _923769 |
|
| 650 | 0 |
_aRisk management _94703 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. _95919 |
|
| 650 | 0 |
_aComputer crimes _xPrevention. _941943 |
|
| 690 |
_933 _a0012 บริหารธุรกิจบัณฑิต สาขาการจัดการโลจิสติกส์และการคมนาคมขนส่ง LTM (ป.ตรี) |
||
| 700 |
_aAbedin, Mohammad Zoynul, _eeditor. _9101630 |
||
| 700 |
_aHájek, Petr, _eeditor. _9101631 |
||
| 942 | _cBK | ||
| 998 | _asiriporn | ||
| 999 |
_c1002041 _d1002041 |
||