Narrow your search
Listing 1 - 10 of 10
Sort by

Book
Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust
Authors: ---
Year: 2018 Publisher: New York, New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Python forensics : a workbench for inventing and sharing digital forensic technology
Authors: --- --- ---
ISBN: 0124186831 0124186769 1306820545 9780124186835 9781306820547 9780124186767 Year: 2014 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile


Book
Cybercrime and espionage : an analysis of subversive multivector threats
Authors: --- ---
ISBN: 1282967479 9786612967474 1597496146 1597496138 Year: 2011 Publisher: Amsterdam : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats? or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from

Invisible threats
Authors: ---
ISBN: 1586036645 6610609810 9786610609819 1429419059 1607502011 6000004656 1280609818 1601295189 9781429419055 9781601295187 9781607502012 9781586036645 Year: 2006 Publisher: Amsterdam Washington, D.C. Ios Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Technology and the information revolution changed the balance of power and altered and corroded the state's authority and strengthened nonstate actors, in particular, transnational crime and terrorist organizations. This book talks about the solution of at least some of the problems and invisible threats that challenge our societies and security.


Book
Hackers Wanted: An Examination of the Cybersecurity Labor Market
Authors: --- --- ---
ISBN: 0833085018 0833085034 083308500X 9780833085030 9780833085016 9780833085023 0833085026 9780833085009 9780833085009 Year: 2014 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.


Book
The global cybercrime industry : economic, institutional and strategic perspectives
Author:
ISBN: 3642424058 3642115217 9786612980565 3642115225 1282980564 Year: 2010 Publisher: Berlin ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion industry and is growing rapidly. It examines economic and institutional processes in the cybercrime industry, provides insights into the entrepreneurial aspect of firms engaged in cyber-criminal activities, takes a close look at cybercrime business models, explains the global variation in the pattern of cybercrimes and seeks to understand threats and countermeasures taken by key actors in this industry. This book’s distinguishing features include the newness, importance, controversiality and complexity of the topic; cross-disciplinary focus, orientation and scope; theory-based but practical and accessible to the wider audience; and illustration of various qualitative and quantitative aspects of the global cybercrime industry.

Keywords

Computer crimes -- Economic aspects. --- Computer crimes -- Prevention -- Economic aspects. --- Computer crimes -- Prevention. --- Computer crimes. --- Computer crimes --- Social Welfare & Social Work --- Management --- Business & Economics --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Management Theory --- Economic aspects --- Prevention --- Economic aspects. --- Prevention. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Business. --- Industrial management. --- Information technology. --- Business --- Ethics. --- Computers. --- Law and legislation. --- E-commerce. --- Mass media. --- Law. --- Business and Management. --- Media Management. --- e-Commerce/e-business. --- IT in Business. --- Media Law. --- Legal Aspects of Computing. --- Data processing. --- Crime --- Privacy, Right of --- Mass media --- Computers --- IT Law, Media Law, Intellectual Property. --- Deontology --- Ethics, Primitive --- Ethology --- Moral philosophy --- Morality --- Morals --- Philosophy, Moral --- Science, Moral --- Philosophy --- Values --- Cyberspace --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Industrial organization --- Law and legislation --- Business—Data processing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Mass communication --- Media, Mass --- Media, The --- Communication --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Advertising media planning. --- Electronic commerce. --- Business information services. --- Information technology --- Media Planning. --- e-Commerce and e-Business. --- Moral Philosophy and Applied Ethics. --- Technology and law --- Information services --- Advertising media, Choice of --- Advertising media selection --- Media planning in advertising


Book
Hacking web apps
Author:
ISBN: 1283578824 9786613891273 1597499560 159749951X 9781597499569 9781597499514 9781283578820 6613891274 Year: 2012 Publisher: Waltham, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this


Book
The future of identity in the information society : challenges and opportunities
Authors: --- ---
ISBN: 3642100155 3540884807 9786612361708 1282361708 3642018203 Year: 2009 Publisher: New York ; Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Digitising personal information is changing our ways of identifying persons and managing relations, e.g. over the Internet. What used to be a "natural" identity, e.g. the personal appearance of an individual at a counter, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents answers from the EU funded research project FIDIS (Future of Identity in the Information Society), a multidisciplinary endeavor of 24 leading institutions from research, government, and industry. Research from states with different cultures on e.g. the identification of citizens and ID cards is combined towards a well-founded analysis of HighTechIDs and Virtual Identities, considering aspects, such as privacy, mobility, interoperability, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –Viviane Reding, Member of the European Commission, Responsible for Information Society and Media.

Keywords

Computer crimes -- Prevention -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Data protection -- Congresses. --- Identity theft -- Prevention -- Congresses. --- Information society -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Privacy, Right of -- Congresses. --- Commerce - General --- Social Change --- Commerce --- Sociology & Social History --- Social Sciences --- Business & Economics --- Information society. --- Privacy, Right of. --- Data protection. --- Identity theft --- Prevention. --- Identity fraud --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Law and legislation --- Business. --- Information technology. --- Business --- Computer security. --- Computers and civilization. --- Business and Management. --- IT in Business. --- Systems and Data Security. --- Computers and Society. --- Data processing. --- False personation --- Theft --- Electronic data processing --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Sociology --- Information superhighway --- Computer science. --- Informatics --- Science --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Security measures --- Business—Data processing. --- Civilization and computers --- Civilization


Book
The Future of Identity in the Information Society : 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers
Authors: --- ---
ISBN: 3642033148 9786613003638 1283003635 3642033156 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed postconference proceedings of the 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, held in Brno, Czech Republic, in September 2008. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are grouped in topical sections on information, ethics, identifiers; privacy issues; wireless security and privacy; challenges of emerging technologies; privacy-enhanced and anonymous applications; business and organizational perspectives; privacy awareness and individual control; and anonymity attacks and analysis. These interdisciplinary contributions target researchers and practitioners interested in the technical, social, ethical or legal perspectives of increasing diversity of information and communication technologies.

Keywords

Computer crimes --Prevention --Congresses. --- Computer networks --Security measures --Congresses. --- Computer security --Congresses. --- Data encryption (Computer science) --Congresses. --- Data protection --Congresses. --- Identity theft --Prevention --Congresses. --- Information society --Security measures --Congresses. --- Internet --Security measures --Congresses. --- Privacy, Right of --Congresses. --- Computer networks --- Internet --- Computer crimes --- Computer security --- Data protection --- Identity theft --- Privacy, Right of --- Information society --- Data encryption (Computer science) --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Prevention --- Identity fraud --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Personal computers. --- E-commerce. --- Computer Science. --- Computers and Society. --- Legal Aspects of Computing. --- Systems and Data Security. --- Data Encryption. --- e-Commerce/e-business. --- Personal Computing. --- False personation --- Theft --- Computers --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Cyberspace --- Informatics --- Science --- Protection --- Law and legislation --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Small computers --- Minicomputers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Sociology --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Information technology --- Data protection. --- Cryptography. --- Electronic commerce. --- Microcomputers. --- Data and Information Security. --- e-Commerce and e-Business. --- Technology and law --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing

Listing 1 - 10 of 10
Sort by