Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522582434
Publisher: IGI Global Publication: February 22, 2019
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781522582434
Publisher: IGI Global
Publication: February 22, 2019
Imprint: Information Science Reference
Language: English

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

More books from IGI Global

Cover of the book Technology-Supported Teaching and Research Methods for Educators by
Cover of the book Flipping Health Care through Retail Clinics and Convenient Care Models by
Cover of the book Developing Strategic Business Models and Competitive Advantage in the Digital Sector by
Cover of the book Designing Games for Ethics by
Cover of the book Nationalism, Social Movements, and Activism in Contemporary Society by
Cover of the book Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare by
Cover of the book Legal and Economic Considerations Surrounding Reproductive Tourism by
Cover of the book Systems Research for Real-World Challenges by
Cover of the book Cognitive Informatics for Revealing Human Cognition by
Cover of the book Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications by
Cover of the book Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications by
Cover of the book Handbook of Research on Transmedia Storytelling and Narrative Strategies by
Cover of the book Digital Initiatives for Literacy Development in Elementary Classrooms by
Cover of the book Medical Applications of Intelligent Data Analysis by
Cover of the book Advanced Image Processing Techniques and Applications by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy