New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Social & Cultural Studies, Political Science
Cover of the book New Threats and Countermeasures in Digital Crime and Cyber Terrorism by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466683471
Publisher: IGI Global Publication: April 30, 2015
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466683471
Publisher: IGI Global
Publication: April 30, 2015
Imprint: Information Science Reference
Language: English

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

More books from IGI Global

Cover of the book Enterprise Management Strategies in the Era of Cloud Computing by
Cover of the book Supply Chain Optimization, Management and Integration by
Cover of the book Multifaceted Approach to Digital Addiction and Its Treatment by
Cover of the book Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments by
Cover of the book Soft-Computing-Based Nonlinear Control Systems Design by
Cover of the book Handbook of Research on Human-Computer Interfaces and New Modes of Interactivity by
Cover of the book Advanced Systems for Improved Public Healthcare and Disease Prevention by
Cover of the book Handbook of Research on Education and Technology in a Changing Society by
Cover of the book Organizational Leadership for the Fourth Industrial Revolution by
Cover of the book Multicultural Awareness and Technology in Higher Education by
Cover of the book Impact of Medical Errors and Malpractice on Health Economics, Quality, and Patient Safety by
Cover of the book Intelligent Image and Video Interpretation by
Cover of the book Research Advances in the Integration of Big Data and Smart Computing by
Cover of the book E-Government Services Design, Adoption, and Evaluation by
Cover of the book Femtocell Communications and Technologies by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy