Corporate Hacking and Technology-Driven Crime

Social Dynamics and Implications

Nonfiction, Reference & Language, Law, Corporate, Social & Cultural Studies, Social Science, Crimes & Criminals, Criminology, Computers, General Computing
Cover of the book Corporate Hacking and Technology-Driven Crime by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466608382
Publisher: IGI Global Publication: August 31, 2010
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466608382
Publisher: IGI Global
Publication: August 31, 2010
Imprint: Information Science Reference
Language: English
In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the “cyber criminal curve.” Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice, Business, and Information Technology Security from around the world, this book presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the “cyber criminal curve.” Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice, Business, and Information Technology Security from around the world, this book presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches.

More books from IGI Global

Cover of the book Memory, Identity, and Nationalism in European Regions by
Cover of the book Handbook of Research on Digital Content, Mobile Learning, and Technology Integration Models in Teacher Education by
Cover of the book Handbook of Research on Strategic Alliances and Value Co-Creation in the Service Industry by
Cover of the book Advancing Teacher Education and Curriculum Development through Study Abroad Programs by
Cover of the book Digital Democracy and the Impact of Technology on Governance and Politics by
Cover of the book Multimedia Services and Applications in Mission Critical Communication Systems by
Cover of the book Strategies for Increasing Diversity in Engineering Majors and Careers by
Cover of the book Advanced Research on Biologically Inspired Cognitive Architectures by
Cover of the book Technology Optimization and Change Management for Successful Digital Supply Chains by
Cover of the book Applied Psycholinguistics and Multilingual Cognition in Human Creativity by
Cover of the book Handbook of Research on Writing and Composing in the Age of MOOCs by
Cover of the book Handbook of Research on Artificial Intelligence Techniques and Algorithms by
Cover of the book Chronic Mental Illness and the Changing Scope of Intervention Strategies, Diagnosis, and Treatment by
Cover of the book Architectures and Protocols for Secure Information Technology Infrastructures by
Cover of the book Techniques for Fostering Collaboration in Online Learning Communities by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy