Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Supply chain software securityAI, Io...
~
SpringerLink (Online service)
Supply chain software securityAI, IoT, and application security /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Supply chain software securityby Aamiruddin Syed.
Reminder of title:
AI, IoT, and application security /
Author:
Syed, Aamiruddin.
Published:
Berkeley, CA :Apress :2024.
Description:
xxx, 559 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Supply chain management.
Online resource:
https://doi.org/10.1007/979-8-8688-0799-2
ISBN:
9798868807992$q(electronic bk.)
Supply chain software securityAI, IoT, and application security /
Syed, Aamiruddin.
Supply chain software security
AI, IoT, and application security /[electronic resource] :by Aamiruddin Syed. - Berkeley, CA :Apress :2024. - xxx, 559 p. :ill., digital ;24 cm.
PART I: FOUNDATION OF NEXT-GEN SUPPLY CHAIN SECURITY -- Chapter 1: The New Era of Supply Chain Security -- Chapter 2: Key Technologies Shaping the Future -- PART II: APPLICATION SECURITY IN THE SUPPLY CHAIN -- Chapter 3: The Anatomy of Supply Chain Applications -- Chapter 4: Application Security Best Practices -- Chapter 5: DevSecOps in Supply Chain Management -- PART III: LEVERAGING AI AND IOT FOR SECURITY -- Chapter 6: AI-Powered Threat Detection and Response -- Chapter 7: IoT Security and Monitoring -- PART IV: CASE STUDIES AND PRACTICAL IMPLEMENTATION -- Chapter 8: Case Studies in Next-Gen Supply Chain Security -- Chapter 9: Implementing Next-Gen Security in Your Supply Chain -- PART V: FUTURE TRENDS AND CHALLENGES -- Chapter 10: Future Trends in Supply Chain Security -- Chapter 11: Navigating Emerging Challenges.
Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. By exploring the intersection of artificial intelligence (AI), the Internet of Things (IoT), and application security, this book presents a comprehensive guide to understanding, adopting, and integrating these technologies to fortify the supply chain against contemporary threats. You'll begin by laying the groundwork, highlighting the evolving threat landscape and how technology has shaped supply chain dynamics over the years. As you venture further, the next few chapters delve into the core technologies: AI's transformative role in predictive analytics and risk management, IoT's capabilities and challenges in supply chain management, and the pivotal role of application security in ensuring data integrity and transactional safety. You'll then transition into an integrative approach, emphasizing the synergies and challenges when combining AI, IoT, and application security. The subsequent chapters focus on examining emerging trends and analyzing case studies that showcase both the vulnerabilities of supply chains and how they can be fortified using next-gen technologies. In a world where supply chains are the lifeblood of global commerce, ensuring their security has never been more critical. Supply Chain Security offers an in-depth exploration of the strategies, technologies, and best practices essential for safeguarding these complex networks. You Will: Understand the transformative role of AI and IoT in revolutionizing supply chain security, enhancing visibility, and predicting potential disruptions before they occur. Uncover the intricacies of application security within the supply chain, learning how to fortify digital infrastructures against emerging cyber threats. Gain invaluable insights into compliance and ethical considerations, ensuring your operations adhere to evolving regulations and promote sustainability and social responsibility.
ISBN: 9798868807992$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0799-2doiSubjects--Topical Terms:
969063
Supply chain management.
LC Class. No.: HD38.6
Dewey Class. No.: 658.500285
Supply chain software securityAI, IoT, and application security /
LDR
:03825nmm a2200325 a 4500
001
672426
003
DE-He213
005
20241113115722.0
006
m d
007
cr nn 008maaau
008
250325s2024 cau s 0 eng d
020
$a
9798868807992$q(electronic bk.)
020
$a
9798868807985$q(paper)
024
7
$a
10.1007/979-8-8688-0799-2
$2
doi
035
$a
979-8-8688-0799-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HD38.6
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
658.500285
$2
23
090
$a
HD38.6
$b
.S982 2024
100
1
$a
Syed, Aamiruddin.
$3
985776
245
1 0
$a
Supply chain software security
$h
[electronic resource] :
$b
AI, IoT, and application security /
$c
by Aamiruddin Syed.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxx, 559 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
PART I: FOUNDATION OF NEXT-GEN SUPPLY CHAIN SECURITY -- Chapter 1: The New Era of Supply Chain Security -- Chapter 2: Key Technologies Shaping the Future -- PART II: APPLICATION SECURITY IN THE SUPPLY CHAIN -- Chapter 3: The Anatomy of Supply Chain Applications -- Chapter 4: Application Security Best Practices -- Chapter 5: DevSecOps in Supply Chain Management -- PART III: LEVERAGING AI AND IOT FOR SECURITY -- Chapter 6: AI-Powered Threat Detection and Response -- Chapter 7: IoT Security and Monitoring -- PART IV: CASE STUDIES AND PRACTICAL IMPLEMENTATION -- Chapter 8: Case Studies in Next-Gen Supply Chain Security -- Chapter 9: Implementing Next-Gen Security in Your Supply Chain -- PART V: FUTURE TRENDS AND CHALLENGES -- Chapter 10: Future Trends in Supply Chain Security -- Chapter 11: Navigating Emerging Challenges.
520
$a
Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. By exploring the intersection of artificial intelligence (AI), the Internet of Things (IoT), and application security, this book presents a comprehensive guide to understanding, adopting, and integrating these technologies to fortify the supply chain against contemporary threats. You'll begin by laying the groundwork, highlighting the evolving threat landscape and how technology has shaped supply chain dynamics over the years. As you venture further, the next few chapters delve into the core technologies: AI's transformative role in predictive analytics and risk management, IoT's capabilities and challenges in supply chain management, and the pivotal role of application security in ensuring data integrity and transactional safety. You'll then transition into an integrative approach, emphasizing the synergies and challenges when combining AI, IoT, and application security. The subsequent chapters focus on examining emerging trends and analyzing case studies that showcase both the vulnerabilities of supply chains and how they can be fortified using next-gen technologies. In a world where supply chains are the lifeblood of global commerce, ensuring their security has never been more critical. Supply Chain Security offers an in-depth exploration of the strategies, technologies, and best practices essential for safeguarding these complex networks. You Will: Understand the transformative role of AI and IoT in revolutionizing supply chain security, enhancing visibility, and predicting potential disruptions before they occur. Uncover the intricacies of application security within the supply chain, learning how to fortify digital infrastructures against emerging cyber threats. Gain invaluable insights into compliance and ethical considerations, ensuring your operations adhere to evolving regulations and promote sustainability and social responsibility.
650
0
$a
Supply chain management.
$3
969063
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Principles and Models of Security.
$3
837243
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0799-2
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000249000
電子館藏
1圖書
電子書
EB HD38.6 .S982 2024 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/979-8-8688-0799-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login