This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.
This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
The World White Web provides an interdisciplinary analysis of far-right radicalisation in the digital age, drawing from criminology, history, and computer science to explore how technology and imagery accelerate extremist recruitment.
The World White Web provides an interdisciplinary analysis of far-right radicalisation in the digital age, drawing from criminology, history, and computer science to explore how technology and imagery accelerate extremist recruitment.
Die Aufmerksamkeit der Geldwäscheprävention ist insbesondere auf technologische Innovationen zu richten, deren möglichen Ausformungen eine erhöhte Geldwäscheaffinität immanent ist.
A comprehensive guide to managing an information security incidentEven when organisations take precautions, they may still be at risk of a data breach.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.