Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile
Choose an application
Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats? or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from
Business intelligence. --- Computer crimes. --- Computer crimes - Prevention. --- Computer crimes -- United States -- Prevention. --- Computer crimes -- United States. --- Computer crimes --Prevention. --- Espionage. --- Security systems. --- Threats - Safety measures. --- Threats -- Safety measures. --- Computer crimes --- Espionage --- Security systems --- Business intelligence --- Threats --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Safety measures --- Information Technology --- General and Others --- Business espionage --- Competitive intelligence --- Corporate intelligence --- Economic espionage --- Espionage, Business --- Espionage, Economic --- Espionage, Industrial --- Industrial espionage --- Intelligence, Business --- Intelligence, Corporate --- Business ethics --- Competition, Unfair --- Industrial management --- Confidential business information --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Choose an application
Technology and the information revolution changed the balance of power and altered and corroded the state's authority and strengthened nonstate actors, in particular, transnational crime and terrorist organizations. This book talks about the solution of at least some of the problems and invisible threats that challenge our societies and security.
Computer crimes -- Economic aspects. --- Computer crimes -- Political aspects. --- Computer crimes -- Prevention. --- National security. --- Computer crimes --- National security --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Social Sciences --- Political aspects --- Economic aspects --- Economic aspects. --- Political aspects. --- National security policy --- NSP (National security policy) --- Security policy, National --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Government policy --- Economic policy --- International relations --- Military policy --- Crime --- Privacy, Right of
Choose an application
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
Computer crimes -- Prevention. --- Cyber intelligence (Computer security). --- Cyberspace -- Security measures,. --- Hackers. --- Professions -- Supply and demand. --- Computer crimes --- Cyber intelligence (Computer security) --- Cyberspace --- Professions --- Hackers --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Security measures, --- Supply and demand --- Prevention. --- Security measures. --- Supply and demand. --- Computer security. --- Computer hackers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer programmers --- Computer users --- Data protection --- Security systems --- Hacking --- Space and time --- Telematics --- E-books --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security
Choose an application
This book is about the global cybercrime industry, which according to some estimates, is a US$1 trillion industry and is growing rapidly. It examines economic and institutional processes in the cybercrime industry, provides insights into the entrepreneurial aspect of firms engaged in cyber-criminal activities, takes a close look at cybercrime business models, explains the global variation in the pattern of cybercrimes and seeks to understand threats and countermeasures taken by key actors in this industry. This book’s distinguishing features include the newness, importance, controversiality and complexity of the topic; cross-disciplinary focus, orientation and scope; theory-based but practical and accessible to the wider audience; and illustration of various qualitative and quantitative aspects of the global cybercrime industry.
Computer crimes -- Economic aspects. --- Computer crimes -- Prevention -- Economic aspects. --- Computer crimes -- Prevention. --- Computer crimes. --- Computer crimes --- Social Welfare & Social Work --- Management --- Business & Economics --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Management Theory --- Economic aspects --- Prevention --- Economic aspects. --- Prevention. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Business. --- Industrial management. --- Information technology. --- Business --- Ethics. --- Computers. --- Law and legislation. --- E-commerce. --- Mass media. --- Law. --- Business and Management. --- Media Management. --- e-Commerce/e-business. --- IT in Business. --- Media Law. --- Legal Aspects of Computing. --- Data processing. --- Crime --- Privacy, Right of --- Mass media --- Computers --- IT Law, Media Law, Intellectual Property. --- Deontology --- Ethics, Primitive --- Ethology --- Moral philosophy --- Morality --- Morals --- Philosophy, Moral --- Science, Moral --- Philosophy --- Values --- Cyberspace --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Industrial organization --- Law and legislation --- Business—Data processing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Mass communication --- Media, Mass --- Media, The --- Communication --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Advertising media planning. --- Electronic commerce. --- Business information services. --- Information technology --- Media Planning. --- e-Commerce and e-Business. --- Moral Philosophy and Applied Ethics. --- Technology and law --- Information services --- Advertising media, Choice of --- Advertising media selection --- Media planning in advertising
Choose an application
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this
Application software - Security measures. --- Computer crimes - Prevention. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer networks. --- Computer security. --- Web site development - Security measures. --- Web sites -- Security measures. --- Computer networks --- Web site development --- Application software --- Computer security --- Computer crimes --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Prevention --- Security measures. --- Prevention. --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Development of Web sites --- Web sites --- Computer network security --- Network security, Computer --- Security of computer networks --- Development --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer software --- Internet programming --- 004.5 --- apps --- hacken --- Mens-computer interactie. Mens-machine interface. User interface. Gebruikersomgeving
Choose an application
Digitising personal information is changing our ways of identifying persons and managing relations, e.g. over the Internet. What used to be a "natural" identity, e.g. the personal appearance of an individual at a counter, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents answers from the EU funded research project FIDIS (Future of Identity in the Information Society), a multidisciplinary endeavor of 24 leading institutions from research, government, and industry. Research from states with different cultures on e.g. the identification of citizens and ID cards is combined towards a well-founded analysis of HighTechIDs and Virtual Identities, considering aspects, such as privacy, mobility, interoperability, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –Viviane Reding, Member of the European Commission, Responsible for Information Society and Media.
Computer crimes -- Prevention -- Congresses. --- Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Data protection -- Congresses. --- Identity theft -- Prevention -- Congresses. --- Information society -- Security measures -- Congresses. --- Internet -- Security measures -- Congresses. --- Privacy, Right of -- Congresses. --- Commerce - General --- Social Change --- Commerce --- Sociology & Social History --- Social Sciences --- Business & Economics --- Information society. --- Privacy, Right of. --- Data protection. --- Identity theft --- Prevention. --- Identity fraud --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Law and legislation --- Business. --- Information technology. --- Business --- Computer security. --- Computers and civilization. --- Business and Management. --- IT in Business. --- Systems and Data Security. --- Computers and Society. --- Data processing. --- False personation --- Theft --- Electronic data processing --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Sociology --- Information superhighway --- Computer science. --- Informatics --- Science --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Security measures --- Business—Data processing. --- Civilization and computers --- Civilization
Choose an application
This book constitutes the refereed postconference proceedings of the 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, held in Brno, Czech Republic, in September 2008. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are grouped in topical sections on information, ethics, identifiers; privacy issues; wireless security and privacy; challenges of emerging technologies; privacy-enhanced and anonymous applications; business and organizational perspectives; privacy awareness and individual control; and anonymity attacks and analysis. These interdisciplinary contributions target researchers and practitioners interested in the technical, social, ethical or legal perspectives of increasing diversity of information and communication technologies.
Computer crimes --Prevention --Congresses. --- Computer networks --Security measures --Congresses. --- Computer security --Congresses. --- Data encryption (Computer science) --Congresses. --- Data protection --Congresses. --- Identity theft --Prevention --Congresses. --- Information society --Security measures --Congresses. --- Internet --Security measures --Congresses. --- Privacy, Right of --Congresses. --- Computer networks --- Internet --- Computer crimes --- Computer security --- Data protection --- Identity theft --- Privacy, Right of --- Information society --- Data encryption (Computer science) --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Prevention --- Identity fraud --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Personal computers. --- E-commerce. --- Computer Science. --- Computers and Society. --- Legal Aspects of Computing. --- Systems and Data Security. --- Data Encryption. --- e-Commerce/e-business. --- Personal Computing. --- False personation --- Theft --- Computers --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Cyberspace --- Informatics --- Science --- Protection --- Law and legislation --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Small computers --- Minicomputers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Sociology --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Information technology --- Data protection. --- Cryptography. --- Electronic commerce. --- Microcomputers. --- Data and Information Security. --- e-Commerce and e-Business. --- Technology and law --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Listing 1 - 8 of 8 |
Sort by
|