Narrow your search

Library

KU Leuven (6)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

VIVES (5)

ULB (4)

LUCA School of Arts (3)

UGent (3)

ULiège (3)

More...

Resource type

book (7)


Language

English (7)


Year
From To Submit

2005 (7)

Listing 1 - 7 of 7
Sort by
Search and seizure of digital evidence
Author:
ISBN: 159332183X 9781593321833 1593321287 9781593321284 Year: 2005 Publisher: New York : LFB Scholarly Pub.,

Organised crime in Europe : the threat of cybercrime : situation report 2004.
Author:
ISBN: 9287156824 Year: 2005 Publisher: Strasbourg Council of Europe

Software piracy exposed
Author:
ISBN: 1423754239 9781423754237 1932266984 9781932266986 9780080489735 0080489737 9786611035853 1281035858 Year: 2005 Publisher: Rockland, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book des

Computer Viruses: from theory to applications
Author:
ISBN: 2287239391 9786610427192 1280427191 2287280995 Year: 2005 Publisher: Paris : Springer Paris : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

“Viruses don’t harm, ignorance does. Is ignorance a defense?” herm1t “[...] I am convinced that computer viruses are not evil and that programmers have a right to create them, to possess them and to experiment with them ... truth seekers and wise men have been per- ´ secuted by powerful idiots in every age ...’ Mark A. Ludwig Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Article 19 of Universal Declaration of Human Rights The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they work. To do this, three aspects are covered ranging from theoretical fundamentals, to pr- tical applications and technical features; fully detailed, commented source 1 We will systematically use the plural form “viruses” instead of the litteral one “virii”. The latter is now an obsolete, though gramatically recommended, form. VIII Preface codes of viruses as well as inherent applications are proposed. So far, the applications-oriented aspects have hardly ever been addressed through the scarce existing literature devoted to computer viruses.

Keywords

Computer viruses. --- Virus informatiques --- Engineering & Applied Sciences --- Computer Science --- Computer crimes. --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Software viruses --- Viruses, Computer --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Algebra. --- Ordered algebraic structures. --- Combinatorics. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Coding and Information Theory. --- Order, Lattices, Ordered Algebraic Structures. --- Crime --- Privacy, Right of --- Computer crimes --- Malware (Computer software) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Combinatorics --- Algebra --- Mathematical analysis --- Mathematics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information theory. --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Communication theory --- Communication --- Cybernetics

Economic espionage and industrial spying
Author:
ISBN: 0521543711 0521835828 9780521543712 9780521835824 9780511610288 0511079982 9780511079986 0511080743 9780511080746 0511610289 9786610415700 6610415706 1107139635 9781107139633 1280415703 9781280415708 0511170807 9780511170805 0511196318 9780511196317 0511297963 9780511297960 Year: 2005 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This 2005 book provides an analytic overview and assessment of the changing nature of crime in the burgeoning information society. Bringing together views from leading national and international authorities, Hedieh Nasheri explains the historical and theoretical background surrounding issues of economic espionage, trade secret theft and industrial spying and its impact on society. She looks at legislative history, the progression of electronic and corporate criminal behavior by introducing the concept of information theft and computer crimes, exploring its definition, its identification and its development within criminology. Nasheri presents an assessment of the state of economic espionage activities within a criminological context and based on that assessment addresses areas where additional action is required. The book also draws attention to a variety of issues raised by economic espionage and technological development. It draws on a variety of disciplines, including criminology, criminal justice, sociology, law and society, economics and political science.

Keywords

Trade secrets. --- Computer crimes. --- Intellectual property. --- Commercial crimes. --- Secrets d'entreprises --- Criminalité informatique --- Propriété intellectuelle --- Infractions économiques --- 174.4 --- 347.77 --- Bedrijfsethiek. Zakenmoraal --- Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- Business intelligence. --- 347.77 Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- 174.4 Bedrijfsethiek. Zakenmoraal --- Criminalité informatique --- Propriété intellectuelle --- Infractions économiques --- Business intelligence --- Commercial crimes --- Computer crimes --- Intellectual property --- Trade secrets --- Business secrets --- Commercial secrets --- Secrets, Trade --- Confidential business information --- Secrecy --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Corporate crime --- Crimes, Financial --- Financial crimes --- Offenses affecting the public trade --- Business espionage --- Competitive intelligence --- Corporate intelligence --- Economic espionage --- Espionage, Business --- Espionage, Economic --- Espionage, Industrial --- Industrial espionage --- Intelligence, Business --- Intelligence, Corporate --- Business ethics --- Competition, Unfair --- Industrial management --- Law and legislation --- Social Sciences --- Sociology

Advances in digital forensics : IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005
Authors: --- --- ---
ISBN: 1280619023 9786610619023 0387311637 9780387300122 0387300120 Year: 2005 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ADVANCES IN DIGITAL FORENSICS Edited by: Mark Pollitt and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Investigative Techniques Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Applications and Techniques This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.

Keywords

Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Data processing --- Investigation --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Criminalistique --- Electronique dans les enquêtes criminelles --- Communication électronique des pièces --- Preuve (Droit pénal) --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer organization. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Science, general. --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Information Storage and Retrieval. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Science --- Crime --- Privacy, Right of --- Information Technology --- Computer Science (Hardware & Networks) --- Computer network architectures. --- Data structures (Computer science) --- Information storage and retrieva. --- Cryptology. --- Data Structures and Information Theory. --- Information retrieval. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Protection --- Security measures --- Information storage and retrieval systems. --- Data structures (Computer scienc. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Organization, Computer --- Electronic evidence --- Digital preservation

Listing 1 - 7 of 7
Sort by