Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
Umsetzbare Sicherheitsstrategien – auch für Unternehmen und Organisationen mit kleinen Budgets- Das komplexe Thema »Informationssicherheit« zugänglich und praxisnah aufbereitet.
Bringing together cutting-edge theory and research that bridges academic disciplines from criminology and criminal justice, to developmental psychology, sociology, and political science, Thinking About Victimization offers an authoritative and refreshingly accessible overview of scholarship on the nature, sources, and consequences of victimization.
Critical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these.
Bringing together cutting-edge theory and research that bridges academic disciplines from criminology and criminal justice, to developmental psychology, sociology, and political science, Thinking About Victimization offers an authoritative and refreshingly accessible overview of scholarship on the nature, sources, and consequences of victimization.
Memetic War analyses memetic warfare included in cyber war and aims to develop a framework for understanding the parameters included in utilising this concept in Ukraine as a part of civic resistance.
Memetic War analyses memetic warfare included in cyber war and aims to develop a framework for understanding the parameters included in utilising this concept in Ukraine as a part of civic resistance.
This book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.
This book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.
This edited volume showcases research on vulnerable victimizations, or more specifically, on individuals and/or populations that, due to their status, have less power in society, are socially controlled in unique ways in the criminal-legal system, or are members of marginalized groups with specialized considerations surrounding their victimization experiences, such as LGBTQIA+ individuals, immigrants, incarcerated persons, children, and females.
This edited volume showcases research on vulnerable victimizations, or more specifically, on individuals and/or populations that, due to their status, have less power in society, are socially controlled in unique ways in the criminal-legal system, or are members of marginalized groups with specialized considerations surrounding their victimization experiences, such as LGBTQIA+ individuals, immigrants, incarcerated persons, children, and females.
Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.
Examining how victimisation can occur across the online-offline continuum while emphasising the need for a holistic approach to understanding and addressing contemporary harms, this book covers various themes of victimisation in the digital age linked to the interconnectedness and blurred boundaries between online and offline experiences.
Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web.
Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web.
Facilitated by developments in technologies, the non-consensual posting of sexually explicit images of someone else for revenge, entertainment or political motive - so-called revenge porn - has become a global phenomenon.
Das Problem der fragmentierten IT Sicherheit: Informationssicherheit und deren Normen und Standards (BSI Grundschutz, ISO27001, weitere) sowie IT-Sicherheit (Technik und Betrieb) sollen zukünftig besser verzahnen.
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing: A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications.
Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context.
Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context.
Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression.
Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
Exploring the pressing issues of juvenile delinquency, victimization, and justice in Chinese societies, this book showcases contemporary research on these critical topics.
This book explores how organized crime has adapted and evolved in sync with ever-expanding technologies to update its popular image and to conduct its covert operations.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.