Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming.
This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019.
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens.
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.
This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.
Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security.
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it.
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
Fraudulent, harmful, or at best useless pharmaceutical and therapeutic approachesdeveloped outside science-based medicine have boomed in recent years, especially due tothe commercialisation of cyberspace.
The Routledge Handbook of International Crime and Justice Studies presents the enduring debates and emerging challenges in crime and justice studies from an international and multi-disciplinary perspective.
In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime.
The regulation of pornography has always been a contentious issue, which has sparked wide-ranging debates surrounding the acceptability and place of pornography in society.
A hands-on, do-it-yourself guide to securing and auditing a networkCNN is reporting that a vicious new virus is wreaking havoc on the world s computer networks.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent.
Real case studies on Internet fraud written by real fraud examiners Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them.
A guidebook to walking a 624km (388 mile) section of Frances GR34 Brittany Coast Path, also known as the Sentier des Douaniers (Customs Officers Path), from Mont-Saint-Michel to Roscoff.
Defend against today's most devious attacksFully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits.
Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression.
Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means.
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.