This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
This book evidences the cyclical failures of online safety policy and challenge conventional policy and educational approaches to tackling online harms, and provide a robust argument for a critical, evidence-based approaches which align with the needs of those we claim to wish to protect.
This book evidences the cyclical failures of online safety policy and challenge conventional policy and educational approaches to tackling online harms, and provide a robust argument for a critical, evidence-based approaches which align with the needs of those we claim to wish to protect.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.
This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.