Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about what follows: the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal. Originally published in 2004, this book provides an international study of the manner in which cyber criminals are dealt with by the judicial process. It is a sequel to the groundbreaking Electronic Theft: Unlawful Acquisition in Cyberspace by Grabosky, Smith and Dempsey (Cambridge University Press, 2001). Some of the most prominent cases from around the world are presented in an attempt to discern trends in the handling of cases, and common factors and problems that emerge during the processes of prosecution, trial and sentencing.
Computer crimes. --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Criminalité informatique --- Social Sciences --- Sociology --- Cybercriminalité. --- Harmonisation du droit --- Logique des decisions --- Sentencing
Choose an application
This 2005 book provides an analytic overview and assessment of the changing nature of crime in the burgeoning information society. Bringing together views from leading national and international authorities, Hedieh Nasheri explains the historical and theoretical background surrounding issues of economic espionage, trade secret theft and industrial spying and its impact on society. She looks at legislative history, the progression of electronic and corporate criminal behavior by introducing the concept of information theft and computer crimes, exploring its definition, its identification and its development within criminology. Nasheri presents an assessment of the state of economic espionage activities within a criminological context and based on that assessment addresses areas where additional action is required. The book also draws attention to a variety of issues raised by economic espionage and technological development. It draws on a variety of disciplines, including criminology, criminal justice, sociology, law and society, economics and political science.
Trade secrets. --- Computer crimes. --- Intellectual property. --- Commercial crimes. --- Secrets d'entreprises --- Criminalité informatique --- Propriété intellectuelle --- Infractions économiques --- 174.4 --- 347.77 --- Bedrijfsethiek. Zakenmoraal --- Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- Business intelligence. --- 347.77 Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- 174.4 Bedrijfsethiek. Zakenmoraal --- Criminalité informatique --- Propriété intellectuelle --- Infractions économiques --- Business intelligence --- Commercial crimes --- Computer crimes --- Intellectual property --- Trade secrets --- Business secrets --- Commercial secrets --- Secrets, Trade --- Confidential business information --- Secrecy --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Corporate crime --- Crimes, Financial --- Financial crimes --- Offenses affecting the public trade --- Business espionage --- Competitive intelligence --- Corporate intelligence --- Economic espionage --- Espionage, Business --- Espionage, Economic --- Espionage, Industrial --- Industrial espionage --- Intelligence, Business --- Intelligence, Corporate --- Business ethics --- Competition, Unfair --- Industrial management --- Law and legislation --- Social Sciences --- Sociology
Choose an application
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There a
Computer networks --- Computer security --- Computer crimes --- Réseaux d'ordinateurs --- Sécurité informatique --- Criminalité informatique --- Access control --- Handbooks, manuals, etc. --- Security measures --- Accès --- Contrôle --- Guides, manuels, etc. --- Sécurité --- Mesures --- Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Computer. Automation --- Computer crimes --- Computers --- Criminalité informatique --- Ordinateurs --- Periodicals --- Access control --- Périodiques --- Accès --- Contrôle --- Computer crimes. --- Access control. --- Computer security --- -658.47805 --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures --- E-journals --- Electronic information resources --- Business, Economy and Management --- Information Technology --- Law --- Accounting and Auditing --- Actuarial Science, Insurance and Risk Management --- E --- Internet --- Software Engineering --- Crime, Criminology and Law Enforcement --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Crime --- Privacy, Right of
Choose an application
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance ? Are such security concerns real, exaggerated or just poorly understood ? The authors provide here a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril. Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies - from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate - to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures.
Internet --- Computer security --- Internet governance --- Computer crimes --- Security, International --- Security measures --- Government policy --- Political aspects --- Prevention --- Internet governance. --- Security, International. --- Systèmes informatiques --- Gouvernance d'Internet --- Criminalité informatique --- Sécurité internationale --- Government policy. --- Political aspects. --- Prevention. --- Mesures de sûreté --- Politique publique. --- Aspect politique --- Prévention. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- CYBERSPACE--SECURITY MEASURES --- INTERNET--SECURITY MEASURES --- COMPUTER SECURITY --- INTERNET--POLITICAL ASPECTS --- COMPUTER CRIMES--PREVENTION --- Computerbeveiliging --- Internet : beveiliging --- Computercriminaliteit --- Computernetwerken --- 681.3 --- 004.7 --- Internet - Security measures - Government policy --- Computer security - Government policy --- Internet - Political aspects --- Computer crimes - Prevention --- Cybercriminalité
Choose an application
ADVANCES IN DIGITAL FORENSICS III Edited by: Philip Craiger and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics III describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: - Legal Issues - Insider Threat Detection - Rootkit Detection - Authorship Attribution - Forensic Techniques - File System Forensics - Network Forensics - Portable Electronic Device Forensics - Evidence Analysis and Management - Formal Methods This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-four edited papers from the Third Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2007. Advances in Digital Forensics III is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Philip Craiger is an Assistant Professor of Engineering Technology and Assistant Director for Digital Evidence at the National Center for Forensic Science, University of Central Florida, Orlando, Florida, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Criminalistique --- Electronique dans les enquêtes criminelles --- Criminalité informatique --- Communication électronique des pièces --- Preuve (Droit pénal) --- Data processing --- Congresses. --- Investigation --- Informatique --- Congrès --- Enquêtes --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Medicine. --- Forensic science. --- Computer science. --- Biomedicine. --- Forensic Science. --- Computer Science, general. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Crime --- Privacy, Right of --- Science --- Forensic medicine. --- Informatics --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Medicine --- Medical laws and legislation --- Electronic evidence --- Digital preservation
Choose an application
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.
Expert systems (Computer science) --- Computer security --- National security --- Computer crimes --- Systèmes experts (Informatique) --- Sécurité informatique --- Sécurité nationale --- Criminalité informatique --- Congresses. --- Investigation --- Congrès --- Enquêtes --- Computer Science --- Engineering & Applied Sciences --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Knowledge-based systems (Computer science) --- Systems, Expert (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Data mining. --- Computers and civilization. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Data Encryption. --- Applications of Mathematics. --- Information Systems Applications (incl. Internet). --- Data Mining and Knowledge Discovery. --- Computer Communication Networks. --- Computers and Society. --- Engineering --- Engineering analysis --- Mathematical analysis --- Civilization and computers --- Civilization --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Mathematics --- Distributed processing --- Crime --- Privacy, Right of --- Data protection --- Security systems --- Hacking --- Artificial intelligence --- Soft computing --- Mathematics. --- Cryptology. --- Math --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
"[This book] examines the three most prevalent cybercrimes afflicting today's corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately and then converged to form an ultra-dangerous composite threat, the book discusses the impact the threats pose and how the very technologies that created the problem can help solve it. [The book] then offers viable strategies for how different types of businesses--from large multinationals to small start-ups--can respond to these threats to both minimize their losses and gain a competitive advantage. The book concludes by identifying future technological threats and how the models presented in the book can be applied to handling them. [This book:] demonstrates how to ... handle corporate cyber security issues using case studies from a wide range of companies around the globe; highlights the regulatory, economic, cultural, and demographic trends businesses encounter when facing security issues; and profiles corporate security issues in major industrialized, developing, and emerging countries throughout North America, Europe, Asia, Latin America, Africa, and the Middle East."--
Computer crimes --- Computer security. --- Computer networks --- Prevention. --- Security measures. --- computer crime --- risk management --- business management --- podnikové vedení --- διοίκηση επιχειρήσεων --- správa spoločnosti --- managementul afacerilor --- uprava podjetja --- Unternehmensführung --- immaniġġjar operazzjonali --- gestão de empresas --- driftsledelse --- gestión empresarial --- uzņēmuma pārvaldība --- upravljanje poduzećem --- управување претпријатија --- företagsförvaltning --- вођење послова предузећа --- bedrijfsbeheer --- gestion d'entreprise --- zarządzanie przedsiębiorstwem --- įmonės valdymas --- menaxhim biznesi --- vállalkozás igazgatása --- ärijuhtimine --- бизнес управление --- yrityshallinto --- gestione d'impresa --- menaxhim i shoqërisë tregtare --- bendrovės administracija --- řízení společnosti --- administrarea companiei --- ettevõtte töökorraldus --- organización de la empresa --- podnikové řízení --- company administration --- strategia aziendale --- įmonės administracija --- менаџмент предузећа --- organisation d'entreprise --- Betriebsorganisation --- gestione aziendale --- uprava poduzeća --- įmonės vadovybė --- organizzazione aziendale --- management --- uzņēmuma pārvalde --- įstaigos vadovybė --- organização da empresa --- ġestjoni tar-riskju --- risicobeheer --- gestione del rischio --- bainistíocht riosca --- obvladovanje tveganja --- administrim i riskut të ndërmarrjes --- risikostyring --- upravljanje rizicima --- kockázatkezelés --- riskijuhtimine --- riskhantering --- riadenie rizík --- gestion du risque --- risku pārvaldība --- řízení rizik --- gestão de riscos --- Risikomanagement --- управление на риска --- gestión de riesgos --- управљање ризиком --- gestionarea riscurilor --- διαχείριση κινδύνων --- rizikos valdymas --- riskinhallinta --- zarządzanie ryzykiem --- управување ризици --- uzņēmuma risku pārvaldība --- riska vadība --- įmonių rizikos valdymas --- kockázatértékelés --- zarządzanie ryzykiem w przedsiębiorstwie --- riskiarviointi --- riska analīze --- risk assessment --- gestion du risque d’entreprise --- posudzovanie rizík --- riskien hallinta --- оценка на риска --- avaliação de riscos --- analiza riscurilor --- evaluación del riesgo --- ocena tveganja --- gestão de riscos empresariais --- riadenie podnikateľských rizík --- bainistiú priacail --- riskanalys --- upravljanje rizicima u poslovanju --- управување ризици во претприемаштво --- risku analīze --- анализа ризика --- riskienhallinta --- vállalati kockázatkezelés --- riskianalüüs --- Unternehmensrisikomanagement --- анализа на ризици --- procjena rizika --- Risikobewertung --- ocena ryzyka --- αξιολόγηση κινδύνου --- posuzování rizik --- analisi dei rischi --- analyse du risque --- évaluation du risque --- analýza rizik --- riskihindamine --- risicomanagement --- anailís riosca --- risk analysis --- ġestjoni tar-riskju fl-intrapriżi --- analiza tveganja --- análisis del riesgo --- εκτίμηση επικινδυνότητας --- risikovurdering --- valutazzjoni tar-riskju --- integraal risicomanagement --- gestione del rischio d'impresa --- analiżi tar-riskju --- ERM --- analiza ryzyka --- analýza rizík --- анализ на риска --- kockázatelemzés --- analiza rizika --- riskinarviointi --- administrim i riskut --- analizë e riskut --- risikoanalyse --- evaluarea riscurilor --- gestion des risques --- riskianalyysi --- enterprise risk management --- análise de riscos --- risku novērtējums --- vlerësimi i riskut --- процена ризика --- ettevõtte riskijuhtimine --- riskbedömning --- rizikos analizė --- risicoanalyse --- ARN --- проценка на ризици --- measúnú riosca --- kockázatmenedzsment --- gestionarea riscurilor în întreprinderi --- obvladovanje tveganja v podjetjih --- ανάλυση κινδύνου (κινδύνων) --- rizikos vertinimas --- Risikoanalyse --- risicobeoordeling --- valutazione del rischio --- számítógépes bűnözés --- arvutikuritegu --- Computerkriminalität --- рачунарски криминал --- računalni kriminal --- компютърно престъпление --- coirpeacht ríomhaire --- criminalité informatique --- εγκληματικότητα στον τομέα της πληροφορικής --- przestępstwo komputerowe --- datakriminalitet --- criminalità informatica --- computercriminaliteit --- ċiberkriminalità --- počítačová kriminalita --- kompiuterinis nusikaltimas --- criminalidade informática --- компјутерски криминал --- databrottslighet --- datornoziegums --- criminalidad informática --- criminalitate informatică --- računalniška kriminaliteta --- krim kompjuterik --- tietokonerikos --- computerfraude --- Computerdelikt --- kibernetski kriminal --- criminalité numérique --- kibernoziegumi --- cibercriminalidade --- databedrägeri --- internetvandalisme --- cybercrime --- databrott --- kriminalità diġitali --- internetes bűnözés --- kibernoziegums --- hacker --- cibearchoireacht --- ηλεκτρονικός βανδαλισμός --- cibercriminalitate --- crime informatique --- Internetkriminalität --- Interneti-kuritegu --- delito cibernético --- vandalizëm kibernetik --- tietokonerike --- kibernetska kriminaliteta --- компјутерски фалсификат --- komputerová kriminalita --- cibercriminalità --- počítačový delikt --- küberkuritegu --- cibervandalismo --- krim i lidhur me kompjuterin --- Interneti-kuritegevus --- kibernetinis nusikaltimas --- ciberdelito --- cyberbrottslighet --- cyberbrott --- infracțiuni informatice --- computerkriminalitet --- компјутерска измама --- cyberkriminalitet --- tietoverkkorikos --- edb-kriminalitet --- fraude informatique --- kibernoziedzība --- cibercrime --- digital kriminalitet --- cybercriminalité --- киберпрестъпност --- cybercriminaliteit --- dataforbrydelse --- informaticadelict --- počítačový trestný čin --- Internet-Vandalismus --- Cyberkriminalität --- διαδικτυακό έγκλημα --- αδίκημα πληροφορικής --- kompjutorski kriminal --- cyberdelict --- frode informatica --- κυβερνοέγκλημα --- computer offence --- krim kibernetik --- internetkriminalitet --- αξιόποινες χρήσεις της πληροφορικής --- tietotekniikkarikollisuus --- délit informatique --- elektroniniai nusikaltimai --- datavandalism --- digitale criminaliteit --- verkkovandalismi --- cyber-vandalism --- kyberkriminalita --- tietoverkkorikollisuus --- küberkuritegevus --- delito informático --- cibercriminalidad --- kiberbűnözés --- IT-brottslighet --- Internet-Kriminalität --- verkkorikollisuus --- reato informatico --- ψηφιακό έγκλημα --- digital crime --- kibernetinis vandalizmas --- datornoziedzība --- cyberprzestępczość --- crimine informatico --- kibernetički vandalizam --- cyberprzestępstwo --- počítačová trestná činnost --- computer-related crime --- kibervandālisms --- cybervandalisme --- cyber-criminalitate --- delict informatic --- arvutikuritegevus --- számítógépes bűncselekmények --- εγκληματικότητα στον κυβερνοχώρο --- tietotekniikkarikos --- kibernetički kriminal --- vepër penale kompjuterike --- ar datoriem saistīta noziedzība --- verkkorikos --- IT-brott --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- bainistíocht gnó --- coireacht ríomhaire --- verslo valdymas --- Electronic commerce
Choose an application
"Threat assessment is a method used by mental health and law enforcement professionals to assess the risk of intended violence toward a specific target, such as attacks and assassinations of public figures, workplace homicides, mass murders, school shootings, and acts of terrorism, both domestic and foreign. Beginning with studies by the U.S. Secret Service twenty years ago, the research and interest in this field has accelerated over the past decade with published scholarship and emerging professional organizations. International Handbook of Threat Assessment offers a definition of the foundations of threat assessment, systematically explores its fields of practice, and provides information and instruction on the best practices of threat assessment. The volume is divided into three sections. Section I defines the difference between threat assessment and traditional violence risk assessment and discusses threat assessment terminology and practice, contemporary understanding of threats, warning behaviors concerning targeted violence, and the legal basis of threats and targeted violence interventions. Section II elaborates on the various domains of threat assessment, such as workplace violence, public figure attacks, school and campus violence, insider threats, honor-based violence, computer-modeling of violent intent, targeted domestic violence, anonymous threats, and cyberthreats. Section III presents the functions of a number of threat assessment individuals and units, including the UK Fixated Threat Assessment Centre, the LAPD Threat Management Unit, Australia's Problem Behaviour Program, and the U.S. Navy Criminal Investigative Service, among others. This book will serve as the standard reference volume in the field of threat assessment and will be invaluable to mental health and criminal justice professionals who practice threat assessment or are interested in understanding this new field of research."--Publisher.
Violence --- Threat (Psychology) --- Risk. --- Violent crimes --- Crimes, Violent --- Crimes of violence --- Crime --- Economics --- Uncertainty --- Probabilities --- Profit --- Risk-return relationships --- Motivation (Psychology) --- Psychology --- Forecasting. --- Prevention. --- Prediction --- Risk --- Forecasting --- Prevention --- E-books --- Vold --- Psykologi --- violence. --- crime against individuals. --- computer crime. --- psychology. --- fight against crime. --- risk management. --- zločin protiv osoba --- kaznivo dejanje zoper posameznika --- престъпление срещу личността --- személy elleni bűncselekmény --- reat kontra individwi --- crime contra as pessoas --- delito contra las personas --- misdaad tegen de personen --- trestný čin proti osobám --- infracțiuni contra persoanei --- delitto contro la persona --- nusikaltimas žmogui --- zločin proti jednotlivcom --- przestępstwo przeciwko osobie --- krim kundër individëve --- coireacht i gcoinne daoine aonair --- forbrydelser mod personer --- Verbrechen gegen Personen --- noziegums pret personām --- brott mot person --- кривично дело против лица --- έγκλημα κατά προσώπων --- isikuvastane kuritegu --- yksilöön kohdistuvat rikokset --- crime contre les personnes --- violenza privata --- trestný čin proti životu a zdraví --- zločin proti jednotlivci --- Körperverletzung --- élet, testi épség és egészség elleni bűncselekmények --- nusikaltimas asmeniui --- lesione personale --- деликти против личности --- minaccia --- казнени дела против поединци --- злостор против лица --- geweld --- βία --- vardarbība --- violență --- насилие --- násilie --- násilí --- väkivalta --- smurtas --- vjolenza --- violenza --- erőszak --- violência --- насилство --- przemoc --- vold --- nasilje --- violencia --- Gewalt --- насиље --- vägivald --- våld --- foréigean --- dhunë --- violence --- smurtavimas --- agresivita --- физичко насилство --- агресивност --- violenza fisica --- violenza morale --- ġestjoni tar-riskju --- risicobeheer --- gestione del rischio --- bainistíocht riosca --- obvladovanje tveganja --- administrim i riskut të ndërmarrjes --- risikostyring --- upravljanje rizicima --- kockázatkezelés --- riskijuhtimine --- riskhantering --- riadenie rizík --- gestion du risque --- risku pārvaldība --- řízení rizik --- gestão de riscos --- Risikomanagement --- управление на риска --- gestión de riesgos --- управљање ризиком --- gestionarea riscurilor --- διαχείριση κινδύνων --- rizikos valdymas --- riskinhallinta --- zarządzanie ryzykiem --- управување ризици --- uzņēmuma risku pārvaldība --- riska vadība --- įmonių rizikos valdymas --- kockázatértékelés --- zarządzanie ryzykiem w przedsiębiorstwie --- riskiarviointi --- riska analīze --- risk assessment --- gestion du risque d’entreprise --- posudzovanie rizík --- riskien hallinta --- оценка на риска --- avaliação de riscos --- analiza riscurilor --- evaluación del riesgo --- ocena tveganja --- gestão de riscos empresariais --- riadenie podnikateľských rizík --- bainistiú priacail --- riskanalys --- upravljanje rizicima u poslovanju --- управување ризици во претприемаштво --- risku analīze --- анализа ризика --- riskienhallinta --- vállalati kockázatkezelés --- riskianalüüs --- Unternehmensrisikomanagement --- анализа на ризици --- procjena rizika --- Risikobewertung --- ocena ryzyka --- αξιολόγηση κινδύνου --- posuzování rizik --- analisi dei rischi --- analyse du risque --- évaluation du risque --- analýza rizik --- riskihindamine --- risicomanagement --- anailís riosca --- risk analysis --- ġestjoni tar-riskju fl-intrapriżi --- analiza tveganja --- análisis del riesgo --- εκτίμηση επικινδυνότητας --- risikovurdering --- valutazzjoni tar-riskju --- integraal risicomanagement --- gestione del rischio d'impresa --- analiżi tar-riskju --- ERM --- analiza ryzyka --- analýza rizík --- анализ на риска --- kockázatelemzés --- analiza rizika --- riskinarviointi --- administrim i riskut --- analizë e riskut --- risikoanalyse --- evaluarea riscurilor --- gestion des risques --- riskianalyysi --- enterprise risk management --- análise de riscos --- risku novērtējums --- vlerësimi i riskut --- процена ризика --- ettevõtte riskijuhtimine --- riskbedömning --- rizikos analizė --- risicoanalyse --- ARN --- проценка на ризици --- measúnú riosca --- kockázatmenedzsment --- gestionarea riscurilor în întreprinderi --- obvladovanje tveganja v podjetjih --- ανάλυση κινδύνου (κινδύνων) --- rizikos vertinimas --- Risikoanalyse --- risicobeoordeling --- valutazione del rischio --- lupta împotriva criminalității --- bűnüldözés --- walka z przestępczością --- borba protiv kriminala --- comhrac i gcoinne na coireachta --- misdaadbestrijding --- lotta contro la criminalità --- ġlieda kontra l-kriminalità --- boj proti zločinu --- rikollisuuden torjunta --- lufta kundër krimit --- bekämpning av grov brottslighet --- cīņa pret noziedzību --- καταπολέμηση του εγκλήματος --- Verbrechensbekämpfung --- kuritegevusevastane võitlus --- bekæmpelse af grov kriminalitet --- lucha contra el crimen --- boj proti kriminalu --- combate ao crime --- борба против криминал --- борба против криминала --- kova su nusikalstamumu --- борба срещу престъпността --- lutte contre le crime --- rikosten ehkäisy --- kriminaalpreventsioon --- prevencia pred zločinom --- crime prevention --- lutte contre la criminalité --- noziegumu novēršana --- спречување криминал --- prevenirea infracțiunilor --- lotta anticrimine --- apsauga nuo nusikaltimų --- nusikaltimų prevencija --- kamp mot kriminalitet --- boj proti kriminalitě --- sprečavanje kriminala --- bűnmegelőzés --- parandalim i krimit --- psychológia --- psihologie --- psiholoģija --- psühholoogia --- psychologia --- psykologia --- psichologija --- psikologji --- psicología --- психологија --- síceolaíocht --- pszichológia --- psykologi --- psikoloġija --- ψυχολογία --- psicologia --- psihologija --- psychologie --- Psychologie --- психология --- psikofiziologji --- psicología de la educación --- lapsipsykologia --- κοινωνική ψυχολογία --- prison psychology --- психопатологија --- παιδοψυχολογία --- sociální psychologie --- börtönpszichológia --- psicología social --- psychopatologie --- vězeňská psychologie --- gyermeklélektan --- kalėjimo psichologija --- inlärningspsykologi --- Kinderpsychologie --- sosiaalipsykologia --- child psychology --- neveléspszichológia --- psicologia social --- psychologické poradenství --- social psychology --- lélektan --- uddannelsespsykologi --- socialpsykologi --- psühhofüsioloogia --- gevangenispsychologie --- udvikling af personligheden --- vankilapsykologia --- psicofisiologia --- psychophysiologie --- kinderpsychologie --- ontwikkelingspsychologie --- Gefängnispsychologie --- Psychophysiologie --- švietimo psichologija --- bērnu psiholoģija --- psychologie de l'enfant --- sociálna psychológia --- koulutuspsykologia --- zatvorska psihologija --- Sozialpsychologie --- psicologia sociale --- ψυχοφυσιολογία --- børnepsykologi --- psihofizioloģija --- socialinė psichologija --- lapsepsühholoogia --- skolpsykologi --- psihologia deținuților --- psicologia infantile --- ψυχολογία της εκπαίδευσης --- sociālā psiholoģija --- psykologi i kriminalvården --- psychologie de l'éducation --- psicología de prisiones --- psychophysiology --- psikologji sociale --- szociálpszichológia --- psykofysiologia --- socijalna psihologija --- psikologjia në burg --- ieslodzīto psiholoģija --- etologie --- pszichofiziológia --- hariduspsühholoogia --- detská psychológia --- pedagoģiskā psiholoģija --- psychologie carcérale --- psicologia infantil --- Schulpsychologie --- sotsiaalpsühholoogia --- sociale psychologie --- dětská psychologie --- психологија на личноста --- barnpsykologi --- psicologia da educação --- psykofysiologi --- psicofisiología --- psychologie sociale --- psicología infantil --- educational psychology --- psichofiziologija --- psicologia carceraria --- psychofysiologie --- σωφρονιστική ψυχολογία --- psikologji e fëmijës --- psihologie socială --- psihologia copilului --- vaiko psichologija --- dječja psihologija --- psihologija obrazovanja --- vanglapsühholoogia --- psikologji edukative --- psicologia dell'educazione --- väzenská psychológia --- számítógépes bűnözés --- arvutikuritegu --- Computerkriminalität --- coireacht ríomhaire --- рачунарски криминал --- računalni kriminal --- компютърно престъпление --- criminalité informatique --- εγκληματικότητα στον τομέα της πληροφορικής --- przestępstwo komputerowe --- datakriminalitet --- criminalità informatica --- computercriminaliteit --- ċiberkriminalità --- počítačová kriminalita --- kompiuterinis nusikaltimas --- criminalidade informática --- компјутерски криминал --- databrottslighet --- datornoziegums --- criminalidad informática --- criminalitate informatică --- računalniška kriminaliteta --- krim kompjuterik --- tietokonerikos --- computerfraude --- Computerdelikt --- kibernetski kriminal --- criminalité numérique --- kibernoziegumi --- cibercriminalidade --- databedrägeri --- internetvandalisme --- cybercrime --- databrott --- kriminalità diġitali --- internetes bűnözés --- kibernoziegums --- hacker --- cibearchoireacht --- ηλεκτρονικός βανδαλισμός --- cibercriminalitate --- crime informatique --- Internetkriminalität --- Interneti-kuritegu --- delito cibernético --- vandalizëm kibernetik --- tietokonerike --- kibernetska kriminaliteta --- компјутерски фалсификат --- komputerová kriminalita --- cibercriminalità --- počítačový delikt --- küberkuritegu --- cibervandalismo --- krim i lidhur me kompjuterin --- Interneti-kuritegevus --- kibernetinis nusikaltimas --- ciberdelito --- cyberbrottslighet --- cyberbrott --- infracțiuni informatice --- computerkriminalitet --- компјутерска измама --- cyberkriminalitet --- tietoverkkorikos --- edb-kriminalitet --- fraude informatique --- kibernoziedzība --- cibercrime --- digital kriminalitet --- cybercriminalité --- киберпрестъпност --- cybercriminaliteit --- dataforbrydelse --- informaticadelict --- počítačový trestný čin --- Internet-Vandalismus --- Cyberkriminalität --- διαδικτυακό έγκλημα --- αδίκημα πληροφορικής --- kompjutorski kriminal --- cyberdelict --- frode informatica --- κυβερνοέγκλημα --- computer offence --- krim kibernetik --- internetkriminalitet --- αξιόποινες χρήσεις της πληροφορικής --- tietotekniikkarikollisuus --- délit informatique --- elektroniniai nusikaltimai --- datavandalism --- digitale criminaliteit --- verkkovandalismi --- cyber-vandalism --- kyberkriminalita --- tietoverkkorikollisuus --- küberkuritegevus --- delito informático --- coirpeacht ríomhaire --- cibercriminalidad --- kiberbűnözés --- IT-brottslighet --- Internet-Kriminalität --- verkkorikollisuus --- reato informatico --- ψηφιακό έγκλημα --- digital crime --- kibernetinis vandalizmas --- datornoziedzība --- cyberprzestępczość --- crimine informatico --- kibernetički vandalizam --- cyberprzestępstwo --- počítačová trestná činnost --- computer-related crime --- kibervandālisms --- cybervandalisme --- cyber-criminalitate --- delict informatic --- arvutikuritegevus --- számítógépes bűncselekmények --- εγκληματικότητα στον κυβερνοχώρο --- tietotekniikkarikos --- kibernetički kriminal --- vepër penale kompjuterike --- ar datoriem saistīta noziedzība --- verkkorikos --- IT-brott
Choose an application
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
Computer science. --- Computer security. --- Data encryption (Computer science). --- System safety. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Security Science and Technology. --- Computer security --- Information technology --- Law and legislation. --- Security measures. --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Security measures --- Internet --- computer piracy --- information security --- computer crime --- számítógépes bűnözés --- arvutikuritegu --- Computerkriminalität --- рачунарски криминал --- računalni kriminal --- компютърно престъпление --- coirpeacht ríomhaire --- criminalité informatique --- εγκληματικότητα στον τομέα της πληροφορικής --- przestępstwo komputerowe --- datakriminalitet --- criminalità informatica --- computercriminaliteit --- ċiberkriminalità --- počítačová kriminalita --- kompiuterinis nusikaltimas --- criminalidade informática --- компјутерски криминал --- databrottslighet --- datornoziegums --- criminalidad informática --- criminalitate informatică --- računalniška kriminaliteta --- krim kompjuterik --- tietokonerikos --- computerfraude --- Computerdelikt --- kibernetski kriminal --- criminalité numérique --- kibernoziegumi --- cibercriminalidade --- databedrägeri --- internetvandalisme --- cybercrime --- databrott --- kriminalità diġitali --- internetes bűnözés --- kibernoziegums --- hacker --- cibearchoireacht --- ηλεκτρονικός βανδαλισμός --- cibercriminalitate --- crime informatique --- Internetkriminalität --- Interneti-kuritegu --- delito cibernético --- vandalizëm kibernetik --- tietokonerike --- kibernetska kriminaliteta --- компјутерски фалсификат --- komputerová kriminalita --- cibercriminalità --- počítačový delikt --- küberkuritegu --- cibervandalismo --- krim i lidhur me kompjuterin --- Interneti-kuritegevus --- kibernetinis nusikaltimas --- ciberdelito --- cyberbrottslighet --- cyberbrott --- infracțiuni informatice --- computerkriminalitet --- компјутерска измама --- cyberkriminalitet --- tietoverkkorikos --- edb-kriminalitet --- fraude informatique --- kibernoziedzība --- cibercrime --- digital kriminalitet --- cybercriminalité --- киберпрестъпност --- cybercriminaliteit --- dataforbrydelse --- informaticadelict --- počítačový trestný čin --- Internet-Vandalismus --- Cyberkriminalität --- διαδικτυακό έγκλημα --- αδίκημα πληροφορικής --- kompjutorski kriminal --- cyberdelict --- frode informatica --- κυβερνοέγκλημα --- computer offence --- krim kibernetik --- internetkriminalitet --- αξιόποινες χρήσεις της πληροφορικής --- tietotekniikkarikollisuus --- délit informatique --- elektroniniai nusikaltimai --- datavandalism --- digitale criminaliteit --- verkkovandalismi --- cyber-vandalism --- kyberkriminalita --- tietoverkkorikollisuus --- küberkuritegevus --- delito informático --- cibercriminalidad --- kiberbűnözés --- IT-brottslighet --- Internet-Kriminalität --- verkkorikollisuus --- reato informatico --- ψηφιακό έγκλημα --- digital crime --- kibernetinis vandalizmas --- datornoziedzība --- cyberprzestępczość --- crimine informatico --- kibernetički vandalizam --- cyberprzestępstwo --- počítačová trestná činnost --- computer-related crime --- kibervandālisms --- cybervandalisme --- cyber-criminalitate --- delict informatic --- arvutikuritegevus --- számítógépes bűncselekmények --- εγκληματικότητα στον κυβερνοχώρο --- tietotekniikkarikos --- kibernetički kriminal --- vepër penale kompjuterike --- ar datoriem saistīta noziedzība --- verkkorikos --- IT-brott --- információbiztonság --- informationssikkerhed --- siguria informatike --- segurança da informação --- sikurezza tal-informazzjoni --- varovanje tajnosti podatkov --- Informationssicherheit --- bezpečnost informačních systémů --- informācijas drošība --- sicurezza delle informazioni --- informacijska sigurnost --- securitatea sistemelor informatice --- infoturve --- tietoturvallisuus --- информационна сигурност --- sécurité des systèmes d’information --- informationssäkerhet --- seguridad informática --- bezpieczeństwo informacji --- slándáil faisnéise --- информатичка безбедност --- informacijos saugumas --- ασφάλεια των συστημάτων πληροφοριών --- bezpečnosť informačných systémov --- informatiebeveiliging --- мрежова сигурност и сигурност в Интернет --- sécurité internet --- infrazzjoni tas-sigurtà tal-informazzjoni --- digital sikkerhed --- дигитална безбедност --- sigurtà tal-internet --- digitale beveiliging --- sikurezza diġitali --- интернетска безбедност --- kibernetska varnost --- zabezpečení informací --- network and Internet security --- parrezikshmëri dixhitale --- осигуреност на информацията --- cyberveiligheid --- kibernetinis saugumas --- informacijos saugumo užtikrinimas --- сигурност в Интернет --- segurança digital --- Infosec --- mbrojtje e informacionit --- digitalna varnost --- zabezpieczanie informacji --- digitālā drošība --- brud på informationssikkerheden --- sieťová a internetová bezpečnosť --- cibersegurança --- kršenje informacijske sigurnosti --- internetna varnost --- assurance de l’information --- Internet safety --- cibersecuritate --- seguridad digital --- securitate informatică --- incidente di sicurezza informatica --- sicurezza digitale --- garantía de la información --- cyberbeveiliging --- kybernetická bezpečnosť --- parrezikshmëria e internetit --- cyber-security --- sicurezza delle reti e dell'informazione --- internetveiligheid --- digitale Sicherheit --- asigurarea informației --- segurança das redes e da Internet --- безбедност на информациите --- cyber-securité --- sigurnost informacija --- verkkoturvallisuus --- událost v oblasti bezpečnosti informací --- цифрова безопасност --- parrezikshmëri kibernetike --- ασφάλεια στο διαδίκτυο --- ασφάλεια των πληροφοριών --- kybernetická bezpečnost --- informācijas drošības incidents --- internetsikkerhed --- information security incident --- cyber-safety --- internetbeveiliging --- incidente no domínio da segurança da informação --- kyberturvallisuus --- cybersicurezza --- internetsäkerhet --- sicurezza informatica --- incident informačnej bezpečnosti --- IT-beveiliging --- digitale veiligheid --- siguria e internetit --- inbreuk op de informatiebeveiliging --- porušení bezpečnosti informačních systémů --- informācijas aizsardzība --- cybersecurity --- кибербезопасност --- információbiztonsági esemény --- hálózatbiztonság --- kršitev varovanja tajnosti podatkov --- ráthú faisnéise --- segurança eletrónica --- naruszenie bezpieczeństwa informacji --- sécurité numérique --- garantia da informação --- informationssikring --- digital safety --- ασφάλεια στον κυβερνοχώρο --- internetbiztonság --- net- og informationssikkerhed --- tietovarmuus --- tietojen turvaaminen --- breach of information security --- tīklu un informācijas drošība --- securitatea rețelelor și a internetului --- digitálna bezpečnosť --- inċident tas-sigurtà tal-informazzjoni --- kiberdrošība --- ИНФОСЕК --- кибербезбедност --- безбедност на компјутерски мрежи --- infosec --- vulnérabilitité des systèmes d'information --- garanzia di sicurezza delle informazioni --- informačná bezpečnosť --- INFOSEC --- IT-sikkerhed --- ψηφιακή ασφάλεια --- kiberbiztonság --- segurança da Web --- varnost omrežij in internetna varnost --- пробив в информационната сигурност --- SRRI --- cybersécurité --- küberjulgeolek --- cybersafety --- mrežna i internetska sigurnost --- tietoverkkoturvallisuus --- cybersäkerhet --- informatieborging --- interneto saugumas --- violazione della sicurezza delle informazioni --- interneto sauga --- περιστατικό ασφάλειας πληροφοριών --- sikurezza tal-internet --- INFOSEC --- digitální bezpečnost --- incident glede varovanja tajnosti podatkov --- segurança cibernética --- incident de securitate cibernetică --- bezpieczeństwo cybernetyczne --- it-säkerhet --- informatiebeveiligingsincident --- shkelje e sigurisë informatike --- cibearshlándáil --- információbiztonsági incidens --- siguria e rrjetit dhe e internetit --- netwerk- en internetbeveiliging --- internetová bezpečnosť --- varnost na internetu --- Incident i sigurisë informatike --- sicurezza di Internet --- bezpieczeństwo cyfrowe --- încălcarea regulilor de securitate a sistemelor informatice --- informacijos saugumo incidentas --- violação da segurança da informação --- bezpieczeństwo w internecie --- sigurnost na internetu --- informationssikkerhedshændelse --- assikurazzjoni tal-informazzjoni --- netbiztonság --- internetová bezpečnost --- informācijas drošības pārkāpums --- NIS --- informacijos saugumo pažeidimas --- információbiztonság megsértése --- cyberbezpieczeństwo --- datasäkerhet --- Netz- und Informationssicherheit --- cybersikkerhed --- siguria kibernetike --- infokindlus --- zagotavljanje informacijske varnosti --- information assurance --- tīklu un interneta drošība --- infoturbeintsident --- kibernetička sigurnost --- parrezikshmëria kibernetike --- Informationssicherung --- sigurtà tan-netwerks u tal-internet --- bezpieczeństwo w sieci i internecie --- segurança informática --- Internetsicherheit --- interneta drošums --- porušenie bezpečnosti informačných systémov --- ciberseguridad --- digitális biztonság --- Cybersicherheit --- incydent związany z bezpieczeństwem informacji --- IT-Sicherheit --- interneta drošība --- Internet security --- InfoSec --- securitate cibernetică --- информациска безбедност --- informationssäkring --- segurança da Internet --- počítačové pirátstvo --- computerpiraterij --- pirateria informatica --- piratage informatique --- компјутерска пиратерија --- píoráideacht bogearraí --- компютърно пиратство --- računalniško piratstvo --- računalno piratstvo --- edb-piratvirksomhed --- piratverksamhet inom dataindustrin --- pirataria informática --- datorpirātisms --- atk-piratismi --- pirateri kompjuterike --- számítógépes kalózkodás --- počítačové pirátství --- piractwo komputerowe --- piraterie informatică --- πειρατεία πληροφορικής --- arvutipiraatlus --- информатичка пиратерија --- Computer-Piraterie --- kompiuterinis piratavimas --- piraterija informatika --- piratería informática --- illegális szoftvermásolás --- nelegāla programmatūras lietošana --- utilizare ilegală de software --- programmatūras pirātisms --- computerkraak --- szoftverkalózkodás --- hekkelés --- keqpërdorim softueri --- danneggiamento di archivi elettronici riservati --- missbruk av programvara --- manipulación fraudulenta de datos informáticos --- Entwendung von Computerprogrammen --- intrusión informática --- proeza informática --- netinkamas programinės įrangos naudojimas --- hekkertevékenység --- software piracy --- počítačová piratela --- komputerové pirátství --- pirataria de software --- πειρατεία προγραμμάτων Η/Υ --- softwarové pirátství --- hekanje --- hakiranje --- piratprogram --- piraterija ta' softwer --- softvérové pirátstvo --- vdiranje v tuje računalniške sisteme --- software misuse --- hakkerointi --- фалсификување компјутерски софтвер --- zneužitie softvéru --- häkkimine --- hakowanie --- незаконско користење софтвер --- ohjelmiston luvaton käyttö --- įsilaužimas į kompiuterines programas ar tinklus --- forcering --- tietomurto --- tarkvarapiraatlus --- détournement de logiciel --- olaglig kopiering av programvara --- софтверска пиратерија --- ohjelmistopiratismi --- copia ilegal de software --- feltörés --- ohjelmapiratismi --- počítačový pirát --- copie illicite de logiciel --- hacking --- piratage de logiciels --- uzlaušana --- piratkopiering af software --- Software-Piraterie --- δικτυοπαραβίαση --- piraterij van programmatuur --- Computerhacking --- хакерство --- piraattarkvara --- пиратство на софтуер --- pirataj informatic --- neatļauta programmatūras lietošana --- nelegálně užívaný software --- piratstvo programske opreme --- softwarepiraterij --- programinės įrangos piratavimas --- intrusion informatique --- Интернет --- internet --- internetas --- idirlíon --- internets --- интернет --- webb --- an tIdirlíon --- tīmeklis --- veeb --- faqe web --- světová počítačová síť --- svjetska računalna mreža --- web --- međumrežje --- www --- világháló --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Prevention
Listing 1 - 10 of 12 | << page >> |
Sort by
|