Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Algebraic geometry --- 511 --- Number theory --- 511 Number theory --- Diophantine analysis. --- Finite fields (Algebra). --- Number theory. --- Nombres, Théorie des. --- Exponential sums. --- Sommes exponentielles. --- Finite fields (Algebra) --- Corps finis --- Géométrie algébrique --- Géométrie algébrique --- Nombres, Théories des --- Sommes exponentielles --- Congruences
Choose an application
The lifeblood of the global economy, information has become a source of growing risk as more firms maintain information online. With risks now fueled by sophisticated, organized, malicious groups, information security requires not only technology, but a clear understanding of potential risks, decision-making behaviors, and metrics for evaluating business and policy options. Managing Information Risk and the Economics of Security, an edited volume contributed by well-established researchers in the field worldwide, presents the latest research on economics driving both the risks and the solutions. Covering the implications of policy within firms and across countries, this volume provides managers and policy makers with new thinking on how to manage risk. Managing Information Risk and the Economics of Security is designed for managers, policy makers, and researchers focusing on economics of information security, as well as for advanced-level students in computer science, business management and economics. .
Algebraic number theory. --- Diophantine approximation. --- Diophantine approximation --- 511.5 --- Approximation, Diophantine --- Diophantine analysis --- Diophantine equations --- 511.5 Diophantine equations --- Biometry --Congresses. --- Computer science. --- Business. --- Management science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Economics. --- Computer Science. --- Systems and Data Security. --- Business and Management, general. --- Computer Communication Networks. --- Data Encryption. --- Economic Systems. --- Algebraic number theory --- Approximation theory --- Number theory --- Business enterprises --- Computer security --- Information resources management --- Risk management. --- Computer networks --- Security measures --- Economic aspects. --- Insurance --- Management --- Corporations --- Information resource management --- Information systems management --- IRM (Information resources management) --- Management information systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Protection --- Cryptology. --- Political Economy/Economic Systems. --- Economic theory --- Political economy --- Social sciences --- Economic man --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Trade --- Economics --- Commerce --- Industrial management --- Economic policy. --- Economic nationalism --- Economic planning --- National planning --- State planning --- Planning --- National security --- Social policy --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Distributed processing --- Approximation diophantienne
Choose an application
Choose an application
Listing 1 - 4 of 4 |
Sort by
|