New Threats and Countermeasures in Digital Crime and Cyber Terrorism
| AUTHOR | Omar, Marwan; Dawson, Maurice; Omar, Marwan et al. |
| PUBLISHER | Information Science Reference (04/30/2015) |
| PRODUCT TYPE | Hardcover (Hardcover) |
Description
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Show More
Product Format
Product Details
ISBN-13:
9781466683457
ISBN-10:
1466683457
Binding:
Hardback or Cased Book (Sewn)
Content Language:
English
More Product Details
Page Count:
390
Carton Quantity:
9
Product Dimensions:
8.50 x 0.88 x 11.00 inches
Weight:
2.62 pound(s)
Feature Codes:
Bibliography,
Index
Country of Origin:
US
Subject Information
BISAC Categories
Computers | Internet - Online Safety & Privacy
Computers | Terrorism
Computers | Security - General
Dewey Decimal:
005.8
Library of Congress Control Number:
2015006753
Descriptions, Reviews, Etc.
publisher marketing
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Show More
List Price $200.00
Your Price
$198.00
