Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local.
A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
Bringing together cutting-edge theory and research that bridges academic disciplines from criminology and criminal justice, to developmental psychology, sociology, and political science, Thinking About Victimization offers an authoritative and refreshingly accessible overview of scholarship on the nature, sources, and consequences of victimization.
This unique volume presents cutting-edge research on the nature and extent of a wide range of scams, cons, frauds, and deceptive activities, including sextortion, the use of ransomware, phishing, identity theft, Ponzi schemes, online shopping fraud, gift card scams, and health care fraud targeting elderly victims.
This book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges.
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting.
This book documents the evolution of the United Nations (UN) Crime Programme and its changing priorities, from the early focus on juvenile delinquency and correctional treatment, to the present preoccupation with transnational organized crime.
Theories of Terrorism explains and advances the major theories of terrorism that address issues of becoming a terrorist, being a terrorist, and leaving terrorism, in a clear and accessible format.
Dieses Buch aus der Reihe „Neue Ansätze für die IT-Revision“ entwickelt aktuelle und neuartige Methoden für die Arbeit der Revision sowie für Prüfungen und Tests von IT-Systemen.
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon.
The desire to steal the intellectual property (IP) of others, be they creative individuals or company teams working in patent pools to create new innovations, remains the same.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource.
Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
As organizations grow increasingly complex and unpredictable, the topic of proactivity at work has become of great importance for contemporary workplaces.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
The regulation of pornography has always been a contentious issue, which has sparked wide-ranging debates surrounding the acceptability and place of pornography in society.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on Africa Internet infrastructure and Services, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type.