Cyberspace and Cybersecurity (2nd Ed.)
Auteur : Kostopoulos George
Vulnerabilities in Information Systems
Vulnerabilities in the Organization
Risk in Information System Infrastructure
Secure Information Systems
Cybersecurity and the CIO
Building a Secure Organization
Cyberspace Intrusions
Cyberspace Defence
Cyberspace and the Law
Cyber Warfare and Homeland Security
Digital Currencies
Dr. George K. Kostopoulos is a faculty member at the University of Maryland University College, where he serves and teaches as a faculty mentor in the master’s degree programs in cybersecurity and information assurance. Dr. Kostopoulos has an extensive international academic career, having taught in seventeen universities around the world, including Boston University, Texas A&M International University, Florida Atlantic University, the University of Heidelberg (Germany), and the American University of Sharjah (UAE). He is the author of numerous scholarly papers and two other books, "Digital Engineering" and "Greece and the European Economic Community." Dr. Kostopoulos received his master’s and PhD degrees in electrical and computer engineering from the Arizona State University, and a master’s in economics from California State Polytechnic University. He is the founder and editor-in-chief of the Journal of Cybersecurity and Information Assurance and a reviewer of numerous scientific conferences.
Date de parution : 09-2020
15.6x23.4 cm
Date de parution : 12-2017
15.6x23.4 cm
Thèmes de Cyberspace and Cybersecurity :
Mots-clés :
International Mobile Equipment Identity; IMEI; Cybersecurity; Information Security; Cyberspace; Chief Information Security Officer; Security Risks; Sensitive Information; Computer Science; Mac Address; Information Science; Anti-virus Software; Antivirus Software; FISMA; Cyber Defense; File Encryption; Cybersecurity Training; IoT Device; LAN; Stateful Protocol Analysis; RACF; Cyber Warfare; Security Content Automation Protocol; Access Control Process; Cloud Computing; WEP; Cyber Espionage; Cyber Crime; National Cybersecurity Strategy; IMEI Number