Skip to main content

Abstract

Information security has always been a priority for any of the areas of human activity. Particularly acute is the issue of information security in our time - in the period of informatics and computerization. A new type of information security threat has emerged - a cyber-attack, as well as cyber war associated with it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Cantu, M. (2003). Mastering Delphi 7, Sybex.

    Google Scholar 

  • Churiev, M., Komoltsev, I., Muratlyev, A. (2012). Иcпoльзoвaниe peecтpa в coвpeмeнныx мeтoдax зaщиты. Teзиcы Meждyнapoднoй нayчнoй кoнфepeнции «Hayкa, тexникa и иннoвaциoнныe тexнoлoгии в cчacтливoй эпoxe мoгyчeгo гocyдapcтвa». Ashkhabad.

    Google Scholar 

  • de Leeuw, K., Bergstra, J. (2007). The History of Information Security: A Comprehensive Handbook. Elsevier Science.

    Google Scholar 

  • Hoffmann, F., Brauweiler, H.-Ch., Wagner, R. (1995). Computergestützte Informationssysteme, Einführung in die Bürokommunikation und Datentechnik für Wirtschaftswissenschaftler. (2 ed.). Oldenbourg.

    Google Scholar 

  • Honeycutt, J. (2002). Microsoft Windows XP Registry Guide. (1 ed.). Microsoft Press.

    Google Scholar 

  • Kokoreva, O. (2008). Peecтp Windows Vista: Пpинципы opгaнизaции и apxи тeктypa peecтpa, cтpyктypa и типы дaнныx; Peзepвнoe кoпи poвaниe и вoccтaнoвлeниe peecтpa. Уcтpaнeниe типoвыx пpoблeм, cвязaнныx c peecтpoм. Petersburg: BHV.

    Google Scholar 

  • Shangin, V. (2013). Кoмплeкcнaя зaщитa инфopмaции в кopпopaтивныx cиcтeмax: Учeбнoe пocoбиe.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hajymuhammet Geldiyev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Fachmedien Wiesbaden GmbH, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Geldiyev, H., Churiyev, M., Mahmudov, R. (2020). Issues regarding cybersecurity in modern world. In: Brauweiler, HC., Kurchenkov, V., Abilov, S., Zirkler, B. (eds) Digitalization and Industry 4.0: Economic and Societal Development. Springer Gabler, Wiesbaden. https://doi.org/10.1007/978-3-658-27110-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-27110-7_1

  • Published:

  • Publisher Name: Springer Gabler, Wiesbaden

  • Print ISBN: 978-3-658-27109-1

  • Online ISBN: 978-3-658-27110-7

  • eBook Packages: Economics and FinanceEconomics and Finance (R0)

Publish with us

Policies and ethics