Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book

Title Safe computing for emerging economies / edited by Longy O. Anyanwu.

Publication Info. Newcastle upon Tyne, UK : Cambridge Scholars Publishing, 2018.
©2018

Item Status

Description 1 online resource (xxii, 177 pages) : illustrations
Physical Medium polychrome
Description text file
Bibliography Includes bibliographical references.
Contents Intro; Table of Contents; Epigraph; Foreword; Preface; Acknowledgment; List of Figures; List of Tables; Chapter One; The Cyberspace; The Growth of Cybercrime; The Need for Cybersecurity; The Plan and Appeal; Chapter Two; Abstract; Introduction; SVM with Clustering for Training; Clustering Tree Based on SVM, CT-SVM; Feed-Forward Neural Networks; Elman Recurrent Neural Networks; Recurrent Neural Networks (RNN); Real-Time Recurrent Learning Algorithm; Characteristic Features of the Proposed System; Conclusion; References; Chapter Three; Abstract; Introduction; Statement of the Problem
Aim and ObjectivesResearch Questions; Hypotheses; Theoretical Framework; Methodology; Results; Discussion of Findings; Conclusion; Recommendations; References; Chapter Four; Abstract; Introduction; Cloud Computing; Common Characteristics; Essential Characteristics; Cloud Deployments Models; Some Commercial Cloud Offerings; Peer-to-peer Cloud Computing; Security Challenges in Peer-to-Peer Cloud Computing; Privacy and Identity of P2P Cloud Computing Users; Poisoning the Peer-to-Peer Cloud Network; Blocking of P2P Traffic by ISP; Conclusion; References; Chapter Five; Abstract; Introduction
Information Technology and Electronically Generated OffensesComputer Crime and Cybercrime; Child Pornography; Spamming; The Problem of Proof of Electronically Generated Evidence as Documentary Evidence; Cybercrime in Nigeria; Impediments to the Enforcement of Cybercrime Laws; Conclusion; References; Chapter Six; Abstract; Introduction; Security Properties of E-Voting; Why Use E-Voting; Materials and Methods; Proposed System Features Description; Proposed System Architecture; Modeling the E-Voting Application Using the Unified Modeling Language (UML); Class Diagram; Association Diagram
Use Case DiagramInformation Engineering; Result and Discussion; Conclusion; References; Chapter Seven; Introduction; Technical Protective Measures; Physical Protective Measures; Personnel Protective Measures; Mitigating Risks Associated with Personnel; Managing Risk Associated with Perso; Security Awareness; Computer Security or Cybersecurity or IT Security; A Culture of Security Awareness; Creating a Security Culture; Acknowledging Security Issues; Accepting Responsibility; Assessing Risk; Crafting Security Policies; Training at all Levels; Creating Benchmarks for Success; Security Audits
Creating Security OperationsBuilding a Successful Team; Planning for Disaster; Conclusion; References; Chapter Eight; Abstract; Introduction; Necessity and Scope; Case Study; Instructions; Online Monitoring Software and Its Usage; Remote Desktop as an Anti-Monitoring Tool; Functional Analysis of Online Monitoring Software; Observation and Information Gathering; Hypothesis Formation and Evaluation; Results Discussion; Offender's Computer Literacy Level as a Function of Monitoring Software Suitability; Summary of Study Conclusions; Informed Opinion; Future Work; References; Chapter Nine
Summary This book highlights the predicaments of the emerging economies of developing countries in the light of the digital divide between these countries and the more developed economies. Particularly, it underscores the dangers these economies face and how those assets may be secured or securely operated. The book delineates the present insecurities in e-business and e-commerce as these emerging economies expand. As such, it will be of interest to governmental entities, businesses, researchers, economists, computer and Internet operatives, and indeed all participants in this technological world.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Electronic commerce -- Security measures -- Developing countries.
Electronic commerce -- Security measures.
Developing countries.
Computer security -- Government policy -- Nigeria.
Computer security -- Government policy.
Nigeria.
Computer security -- Law and legislation -- Nigeria.
BUSINESS & ECONOMICS -- Commerce.
Computer security.
BUSINESS & ECONOMICS -- Marketing -- General.
Computer security -- Law and legislation.
BUSINESS & ECONOMICS -- Sales & Selling -- General.
Added Author Anyanwu, Longy O., editor, author.
Other Form: Print version: Safe computing for emerging economies. Newcastle upon Tyne, UK ; Cambridge Scholars Publishing, 2018 9781527506701 (OCoLC)1022509426
ISBN 9781527525948 (electronic book)
1527525945 (electronic book)
9781527506701
1527506703