The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
Exploring the pressing issues of juvenile delinquency, victimization, and justice in Chinese societies, this book showcases contemporary research on these critical topics.
Aslam and Gunaratna bring together a broad analysis of the responses of states in Asia to the threats presented by the COVID-19 pandemic in its early phase.
Aslam and Gunaratna bring together a broad analysis of the responses of states in Asia to the threats presented by the COVID-19 pandemic in its early phase.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses.
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon.
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon.
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition.
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
A Fresh Look at Fraud features psychologists, criminologists, and computer scientists to address the state-of-the-art research on the rising problem of fraud, scams, and financial abuse, stimulating a cross-disciplinary exchange of ideas, theories, methods, and practices.
A Fresh Look at Fraud features psychologists, criminologists, and computer scientists to address the state-of-the-art research on the rising problem of fraud, scams, and financial abuse, stimulating a cross-disciplinary exchange of ideas, theories, methods, and practices.