This book will serve as a practical guide for entrepreneurs and investors/advisors in constructing and understanding valuations of startups in rapidly shifting industries, including the areas of drug development, medical devices, cyber security, and renewable energy.
This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book identifies and examines the novel ways in which money is laundered internationally through illegal activities on the internet, focusing on sales, payments, social media, online gaming, and tax misapplication.
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate.
This book is a means to diagnose, anticipate and address new cyber risks and vulnerabilities while building a secure digital environment inside and around businesses.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
In a world of globalization and technological change, terrorism continues to pose grave threats not only to more traditional targets such as civilians and government targets, but according to many experts, increasingly to multinational corporations and other international economic enterprises.
In a world of globalization and technological change, terrorism continues to pose grave threats not only to more traditional targets such as civilians and government targets, but according to many experts, increasingly to multinational corporations and other international economic enterprises.
This book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry.
Digital Earth - Cyber threats, privacy and ethics in an age of paranoiaWhether it s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years.
Digital Earth - Cyber threats, privacy and ethics in an age of paranoiaWhether it s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years.
This edited book explores the history, development and use of technology in the policing of society, showing that technology plays a key, if not pivotal role in the work of law enforcement.
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes.
This book explores the manifold actual, possible and probable interconnections between gambling and crime in the context of the increased availability of wagering activities across many regions of the world.
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud.
This book responds to the claim that criminology is becoming socially and politically irrelevant despite its exponential expansion as an academic sub-discipline.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.