Deploying empirical studies spanning from early Imperial China to the present day, 17 scholars from across the globe explore the history of surveillance with special attention to the mechanisms of power that impel the concept of surveillance in society.
The Routledge Handbook of International Crime and Justice Studies presents the enduring debates and emerging challenges in crime and justice studies from an international and multi-disciplinary perspective.
In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime.
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
As organizations grow increasingly complex and unpredictable, the topic of proactivity at work has become of great importance for contemporary workplaces.
An essential reference for scholars and others whose work brings them into contact with managing, policing and regulating online behaviour, the Handbook of Internet Crime emerges at a time of rapid social and technological change.
The desire to steal the intellectual property (IP) of others, be they creative individuals or company teams working in patent pools to create new innovations, remains the same.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
This book constitutes papers presented during the workshop session titled "e;CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy"e; during the Privacy Symposium hosted by Universita Ca' Foscari in Venice, Italy, in April 2022.
This book explores, through a children's rights-based perspective, the emergence of a safeguarding dystopia in child online protection that has emerged from a tension between an over-reliance in technical solutions and a lack of understanding around code and algorithm capabilities.
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction.
Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019In modern times, all individuals need to be knowledgeable about cybersecurity.
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy.
The latest techniques for averting UC disasterEstablish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal.
Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and legislators to address such anxieties.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
Adopting a case-based approach, Global Financial Investigations introduces the fascinating world of forensic accounting and investigating transnational financial crimes, providing an overview of core concepts and current industry trends, together with practical guidance to equip readers with the knowledge required to combat complex financial crimes.
Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming.
The regulation of pornography has always been a contentious issue, which has sparked wide-ranging debates surrounding the acceptability and place of pornography in society.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020.
Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies.
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity.
* THE NEW YORK TIMES BESTSELLER ** Future-proof yourself and your business by reading this book * Technological advances have benefited our world in immeasurable ways, but there is an ominous flipside.
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence.
Fully up-to-date coverage of every topic on the CEH v9 certification examThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam.
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results.
This book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges.
This book, written by two leading authorities in the field, provides a systematic application of concepts of situational crime prevention to internet and e-commerce crime, exploring ways in which concepts of crime prevention developed in other contexts can be fruitfully applied in this new environment.
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.