This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.
The World White Web provides an interdisciplinary analysis of far-right radicalisation in the digital age, drawing from criminology, history, and computer science to explore how technology and imagery accelerate extremist recruitment.
The World White Web provides an interdisciplinary analysis of far-right radicalisation in the digital age, drawing from criminology, history, and computer science to explore how technology and imagery accelerate extremist recruitment.
Die Aufmerksamkeit der Geldwäscheprävention ist insbesondere auf technologische Innovationen zu richten, deren möglichen Ausformungen eine erhöhte Geldwäscheaffinität immanent ist.
A comprehensive guide to managing an information security incidentEven when organisations take precautions, they may still be at risk of a data breach.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
Esta obra se encuentra enmarcada en el contexto de dos áreas del conocimiento: el derecho y las tecnologías de la información y las comunicaciones; el autor ofrece un detallado análisis comparativo de las normas jurídicas penales de la Unión Europea, Argentina, Perú, Chile y Colombia en relación con los delitos informáticos como un instrumento institucional de la lucha contra la ciberdelincuencia.
This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security.
This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security.