Atnaujinkite slapukų nuostatas
  • Formatas: 302 pages
  • Išleidimo metai: 29-Nov-2023
  • Leidėjas: CRC Press
  • Kalba: eng
  • ISBN-13: 9781000986693

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book's objective is to present an interdisciplinary and easily understandable book on the Dark Web. This research will benefit security agencies, security professionals, counter-terrorism experts, and policymakers. This book has covered dark web topics that give a reader a good idea about the dark web. Mainly it focused on the dark market and also mentioned the positive side of dark web. We have also mentioned the emerging dark web trends and mitigation techniques. What are the cyber crimes on the dark web? How people are doing business, and which areas are mostly focused on the dark web.



What are cyber crimes on the dark web? How people are doing business, and which areas are mostly focused on the dark web. This book's objective is to present an interdisciplinary and easily understandable book on the Dark Web. This research will benefit security agencies, security professionals, counter-terrorism experts, and policymakers.

1. Cybersecurity and The Dark Web.
2. A Guide to The Dark and Deep Web.
3. Dark Web Access with TOR Browser.
4. The Dark Web's Perils.
5. Cybercrime on The Dark Web.
6. Red Room Deep Web.
7. Terrorist Acts on The Surface and Dark Web.
8. Dark Web Markets.
9. We Are Anonymous.
10. Hitman for Hire.
11. The Positive and Evil Side of The Dark Web.
12. Techniques for Analyzing Dark Web Content.
13. Information Extraction from Dark Web Contents and Logs.
14. Dark Web Forensics.
15. OSINT Opensource Intelligence.
16. Emerging Dark Web Trends and Mitigation Techniques.
17. The Dark Web's Future.
18. Your Business on The Dark Web. Glossary. Bibliography.

Dr. Atif Ali - Postdoctoral Researcher in RMC|MMU Cyberjaya Malaysia. He has a PhD in Computer Science (Artificial Intelligence-Based Software Engineering) and is certified by OS Forensics. His research contributions are in the Dark Web, Artificial Intelligence, and Software Engineering. He has more than 40 research articles to his credit that are internationally recognised. He has received more than 47 National/ Provincial awards in different co-curricular activities. He is working hard to make the cyberworld safe.

Muhammad Qasim MS Security Technology, from the University of Wales, Cardiff (UK). He holds multiple international publications and certifications in Cyber Security, Cloud Networks, and Information Technology. Currently he has CyberSec First Responder, CompTIA | CEH| CHFI| Security +, SixSigma, and Microsoft Azure.