Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522582434
Publisher: IGI Global Publication: February 22, 2019
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781522582434
Publisher: IGI Global
Publication: February 22, 2019
Imprint: Information Science Reference
Language: English

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

More books from IGI Global

Cover of the book Innovative Applications of Knowledge Discovery and Information Resources Management by
Cover of the book Perspectives and Techniques for Improving Information Technology Project Management by
Cover of the book Intelligent Multimedia Technologies for Networking Applications by
Cover of the book Emerging Innovations in Wireless Networks and Broadband Technologies by
Cover of the book Market Research Methodologies by
Cover of the book Management Control Systems in Complex Settings by
Cover of the book Teaching Literature and Language Through Multimodal Texts by
Cover of the book Handbook of Research on Emerging Practices and Methods for K-12 Online and Blended Learning by
Cover of the book Mobile Technologies and Handheld Devices for Ubiquitous Learning by
Cover of the book Digital Rights Management by
Cover of the book Global Perspectives on Human Capital-Intensive Firms by
Cover of the book Handbook of Research on Instructional Systems and Educational Technology by
Cover of the book Enhancing Competitive Advantage With Dynamic Management and Engineering by
Cover of the book Artificial Intelligence Technologies and the Evolution of Web 3.0 by
Cover of the book Computational Intelligence in Remanufacturing by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy