(Išleidimo metai: 31-Jul-2025, Hardback, Leidėjas: Bristol University Press, ISBN-13: 9781529235906)
Digital tools such as smart devices, personal trackers and social media have become part of daily life for many. Onlife (online+life) criminology is the study of crime and social harm produced by the blurring lines between digital engagement and...Daugiau...
To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the signif...Daugiau...
We can look at cybersecurity culture from different perspectives, from the organizational point of view or from within the culture. Attitudes toward security have different manifestations in each organizational culture. We also see how the cyberse...Daugiau...
We can look at cybersecurity culture from different perspectives, from the organizational point of view or from within the culture. Attitudes toward security have different manifestations in each organizational culture. We also see how the cyberse...Daugiau...
The book is essential reading for CISOs, DPOs, CPOs, Sourcing Managers, Vendor Risk Managers, Chief Procurement Officers, Cyber Risk Managers, Compliance Managers, and other cyber stakeholders, as well as students in cyber security. ...Daugiau...
Cybersecurity is typically viewed as the boogeyman, and vendors are responsible for 63 of reported data breaches in organisations. And as businesses grow, they will use more and more third parties to provide specialty services. Typical cybersecur...Daugiau...
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Writ...Daugiau...
Learn essential tactics for cyber crisis management, including preventive measures, response strategies, and the importance of a proactive approach to cybersecurity. With actionable advice and real-world examples, youll discover the knowledge and...Daugiau...
Today, cybercrime is an enormous problem and one that threatens our future security.But we have two awesome weapons with which to fight it: science and technology. This exciting book explores the work of scientists and crim...Daugiau...
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures...Daugiau...
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime...Daugiau...
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime an...Daugiau...
This book provides a comprehensive and synthetic analysis of the legal acts of the Council of Europe and the European Union affecting regulation of cybercrime in EU countries. Technical aspects relating to cybercrime are also discussed. The work exp...Daugiau...
Ši knyga nebeleidžiama, tačiau mes Jums pranešime naudoto egzemplioriaus kainą
Buy a new version of this textbook and receive access to the Connected eBook on Casebook Connect, including lifetime access to the online ebook with highlight, annotation, and search capabilities. Access also includes an outline...Daugiau...
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data.Cybersecurity incidents make the news with startling regularity. Each breachthe theft of 145.5 million Americans inf...Daugiau...