Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world.
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens.
Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues related to the assessment and management of risk in the new security age.
Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues related to the assessment and management of risk in the new security age.
Ambient assisted living (AAL) utilizes information and communication technology to empower individuals to maintain an active and independent lifestyle for as long as possible.
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats.
Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media.
Cybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation.
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape.
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function.
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts.
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets.
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management.
The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge.
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and legislators to address such anxieties.
Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and legislators to address such anxieties.
"e;This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a 'must have' for every researcher, student, and practicing professional in software protection.
Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company.
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as a result of state concern with security, crime and economic advantage.
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as a result of state concern with security, crime and economic advantage.
In an era where advanced technology plays a critical role in maintaining national security, Artificial Intelligence for Military Applications with Blockchain investigates how combining AI and blockchain could transform military operations.