Cyber Crime and Cyber Terrorism Investigator's Handbook

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Crime and Cyber Terrorism Investigator's Handbook by , Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9780128008119
Publisher: Elsevier Science Publication: July 16, 2014
Imprint: Syngress Language: English
Author:
ISBN: 9780128008119
Publisher: Elsevier Science
Publication: July 16, 2014
Imprint: Syngress
Language: English

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.

Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.

Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.

  • Written by experts in cyber crime, digital investigations, and counter-terrorism
  • Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators
  • Keep up to date on current national and international law regarding cyber crime and cyber terrorism
  • See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.

Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.

Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.

More books from Elsevier Science

Cover of the book Superconductors in the Power Grid by
Cover of the book Underground Coal Gasification and Combustion by
Cover of the book Successful Private Practice in Neuropsychology and Neuro-Rehabilitation by
Cover of the book Highway Bridge Maintenance Planning and Scheduling by
Cover of the book Nanoelectronics by
Cover of the book Well Testing Project Management by
Cover of the book Lockhart and Wiseman’s Crop Husbandry Including Grassland by
Cover of the book Riemannian Submersions, Riemannian Maps in Hermitian Geometry, and their Applications by
Cover of the book The Jehol Fossils by
Cover of the book Materials and Innovative Product Development by
Cover of the book Medicinal Plants by
Cover of the book Bioconjugate Techniques by
Cover of the book Handbook of Algebra by
Cover of the book International Review of Neurobiology by
Cover of the book WAIS-IV Clinical Use and Interpretation by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy