In einer Welt, die zunehmend von digitalen Technologien geprägt ist, gewinnt das IT-Audit eine Schlüsselrolle in der Sicherung von Daten, Prozessen und Compliance.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it.
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
In an increasingly interconnected and digital world, this book provides comprehensive guidance on cybersecurity leadership specifically tailored to the context of public policy and administration in the Global South.
This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U.
This unique volume presents cutting-edge research on the nature and extent of a wide range of scams, cons, frauds, and deceptive activities, including sextortion, the use of ransomware, phishing, identity theft, Ponzi schemes, online shopping fraud, gift card scams, and health care fraud targeting elderly victims.
This book documents the evolution of the United Nations (UN) Crime Programme and its changing priorities, from the early focus on juvenile delinquency and correctional treatment, to the present preoccupation with transnational organized crime.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
This book documents the evolution of the United Nations (UN) Crime Programme and its changing priorities, from the early focus on juvenile delinquency and correctional treatment, to the present preoccupation with transnational organized crime.
This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U.
It is imperative that educators, parents, and potential victims be aware of sexual predators, the danger they pose in our society, and the resources available to help prevent this growing epidemic.
Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means.
Discussing social media-related scholarship found in criminology, legal studies, policing, courts, corrections, victimization, and crime prevention, this book presents the current state of our knowledge on the impact of social media and the major sociological frameworks employed to study the U.
Umsetzbare Sicherheitsstrategien – auch für Unternehmen und Organisationen mit kleinen Budgets- Das komplexe Thema »Informationssicherheit« zugänglich und praxisnah aufbereitet.
This book addresses social and complex network analysis challenges, exploring social network structures, dynamic networks, and hierarchical communities.
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and "e;canceling"e; people for perceived violations of norms.