New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Social & Cultural Studies, Political Science
Cover of the book New Threats and Countermeasures in Digital Crime and Cyber Terrorism by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466683471
Publisher: IGI Global Publication: April 30, 2015
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466683471
Publisher: IGI Global
Publication: April 30, 2015
Imprint: Information Science Reference
Language: English

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

More books from IGI Global

Cover of the book Emerging Pedagogies in the Networked Knowledge Society by
Cover of the book Discoveries in Gaming and Computer-Mediated Simulations by
Cover of the book Cases on Teacher Identity, Diversity, and Cognition in Higher Education by
Cover of the book Research Methods by
Cover of the book Power, Surveillance, and Culture in YouTube™'s Digital Sphere by
Cover of the book Data Science and Simulation in Transportation Research by
Cover of the book Technological Breakthroughs in Modern Wireless Sensor Applications by
Cover of the book Chaos and Complexity Theory for Management by
Cover of the book Microfinance and Its Impact on Entrepreneurial Development, Sustainability, and Inclusive Growth by
Cover of the book Handbook of Research on Holistic Optimization Techniques in the Hospitality, Tourism, and Travel Industry by
Cover of the book Knowledge-Based Processes in Software Development by
Cover of the book Rethinking Machine Ethics in the Age of Ubiquitous Technology by
Cover of the book Emerging Innovations in Microwave and Antenna Engineering by
Cover of the book Brand Management in Emerging Markets by
Cover of the book Utilizing Evidence-Based Lessons Learned for Enhanced Organizational Innovation and Change by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy