Facilitated by developments in technologies, the non-consensual posting of sexually explicit images of someone else for revenge, entertainment or political motive - so-called revenge porn - has become a global phenomenon.
The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces.
The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment.
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guideThis thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam.
Fully up-to-date coverage of every topic on the CEH v9 certification examThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam.
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries.
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse.
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse.
The Routledge Handbook of International Crime and Justice Studies presents the enduring debates and emerging challenges in crime and justice studies from an international and multi-disciplinary perspective.
The Routledge Handbook of International Crime and Justice Studies presents the enduring debates and emerging challenges in crime and justice studies from an international and multi-disciplinary perspective.
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.
Over the last decade there has been dramatically increased interest in the ways that technology has been used in the abuse and exploitation of children, due in part to increasing numbers of convictions for child pornography-related offenses.
Over the last decade there has been dramatically increased interest in the ways that technology has been used in the abuse and exploitation of children, due in part to increasing numbers of convictions for child pornography-related offenses.
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world.
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens.
Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues related to the assessment and management of risk in the new security age.
Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues related to the assessment and management of risk in the new security age.
Cybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation.
Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and legislators to address such anxieties.
Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and legislators to address such anxieties.
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as a result of state concern with security, crime and economic advantage.
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as a result of state concern with security, crime and economic advantage.