Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522582434
Publisher: IGI Global Publication: February 22, 2019
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781522582434
Publisher: IGI Global
Publication: February 22, 2019
Imprint: Information Science Reference
Language: English

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

More books from IGI Global

Cover of the book Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence by
Cover of the book Culturally Engaging Service-Learning With Diverse Communities by
Cover of the book Encyclopedia of Information Science and Technology, Third Edition by
Cover of the book Supply Chain Sustainability and Raw Material Management by
Cover of the book Handbook of Research on Student-Centered Strategies in Online Adult Learning Environments by
Cover of the book Integrating Cognitive Architectures into Virtual Character Design by
Cover of the book Defending Human Rights and Democracy in the Era of Globalization by
Cover of the book Preparing Foreign Language Teachers for Next-Generation Education by
Cover of the book Open-Source Technologies for Maximizing the Creation, Deployment, and Use of Digital Resources and Information by
Cover of the book Business Models for Renewable Energy Initiatives by
Cover of the book Systems and Software Development, Modeling, and Analysis by
Cover of the book Handbook of Research on Global Enterprise Operations and Opportunities by
Cover of the book Computer Vision and Pattern Recognition in Environmental Informatics by
Cover of the book Emerging Issues, Challenges, and Opportunities in Urban E-Planning by
Cover of the book Computer Engineering by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy