The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues.
With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues.
Blockchain, a decentralized ledger technology based on cryptographic algorithms, ensures the creation of immutable and tamper-proof ledgers in decentralized systems.
Blockchain, a decentralized ledger technology based on cryptographic algorithms, ensures the creation of immutable and tamper-proof ledgers in decentralized systems.
Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure security, including the skills needed to implement security controls, maintain an organization's security posture, and identify and remediate security vulnerabilities.
Amidst the sensationalist claims about the dangers of the Internet, Virtually Criminal provides an empirically grounded criminological analysis of deviance and regulation within an online community.
Amidst the sensationalist claims about the dangers of the Internet, Virtually Criminal provides an empirically grounded criminological analysis of deviance and regulation within an online community.
The Politics of Cyberconflict focuses on the implications that the phenomenon of cyberconflict (conflict in computer mediated enivironments and the internet) has on politics, society and culture.
The Politics of Cyberconflict focuses on the implications that the phenomenon of cyberconflict (conflict in computer mediated enivironments and the internet) has on politics, society and culture.
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threatsKey FeaturesProtect your financial environment with cybersecurity practices and methodologiesIdentify vulnerabilities such as data manipulation and fraudulent transactionsProvide end-to-end protection within organizationsBook DescriptionOrganizations have always been a target of cybercrime.
An essential reference for scholars and others whose work brings them into contact with managing, policing and regulating online behaviour, the Handbook of Internet Crime emerges at a time of rapid social and technological change.
An essential reference for scholars and others whose work brings them into contact with managing, policing and regulating online behaviour, the Handbook of Internet Crime emerges at a time of rapid social and technological change.
Crime Online is concerned to explore the dual capacity of the Internet to pervert and to democratize: it offers its users freedom, democracy, and communication with people around the world while at the same time generating anxieties concerning its potential to corrupt vulnerable minds and facilitate heinous crimes.
Crime Online is concerned to explore the dual capacity of the Internet to pervert and to democratize: it offers its users freedom, democracy, and communication with people around the world while at the same time generating anxieties concerning its potential to corrupt vulnerable minds and facilitate heinous crimes.
This book, written by two leading authorities in the field, provides a systematic application of concepts of situational crime prevention to internet and e-commerce crime, exploring ways in which concepts of crime prevention developed in other contexts can be fruitfully applied in this new environment.
This book, written by two leading authorities in the field, provides a systematic application of concepts of situational crime prevention to internet and e-commerce crime, exploring ways in which concepts of crime prevention developed in other contexts can be fruitfully applied in this new environment.
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems.
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before.
Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam.
Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr.
Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr.
THE WILEY 5G REF Explore cutting-edge subjects in 5G privacy and security In The Wiley 5G REF: Security, a team of distinguished researchers delivers an insightful collection of articles selected from the online-only The Wiley 5G Reference.
THE WILEY 5G REF Explore cutting-edge subjects in 5G privacy and security In The Wiley 5G REF: Security, a team of distinguished researchers delivers an insightful collection of articles selected from the online-only The Wiley 5G Reference.
Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam.
Prepare for success on the challenging CASP+ CAS-004 exam In the newly updated Second Edition of CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004, accomplished cybersecurity expert Nadean Tanner delivers an extensive collection of CASP+ preparation materials, including hundreds of domain-by-domain test questions and two additional practice exams.
CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.