Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Computer crimes --- Evidence, Criminal --- Computer files --- Machine-readable data files --- Machine-readable files --- Digital media --- Files (Records) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Investigation --- Law and legislation
Choose an application
Criminal law. Criminal procedure --- Criminology. Victimology --- Europe --- Organized crime --- -Computer crimes --- -364.1 --- Ta3.a --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Crime syndicates --- Organised crime --- -Organized crime --- Computer crimes --- -Computer crimes -
Choose an application
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book des
Computer. Automation --- Information Technology --- General and Others --- Acquisition of computer software. --- Computer crimes. --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Acquisition of computer programs --- Computer software --- Protection --- Security measures
Choose an application
Information society --- Information technology --- Trust --- Risk perception --- Computer crimes --- Société informatisée --- Technologie de l'information --- Confiance --- Perception du risque --- Criminalité informatique --- Social aspects --- Prevention. --- Aspect social --- Prévention --- #SBIB:053.IOS --- #SBIB:343.9H0 --- #SBIB:35H24 --- #SBIB:309H1720 --- Criminologie --- Informatiemanagement bij de overheid --- Informatiekunde, informatie management --- Société informatisée --- Criminalité informatique --- Prévention --- Trust (Psychology) --- Attitude (Psychology) --- Emotions --- Awareness, Risk --- Risk awareness --- Perception --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Sociology --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Prevention
Choose an application
“Viruses don’t harm, ignorance does. Is ignorance a defense?” herm1t “[...] I am convinced that computer viruses are not evil and that programmers have a right to create them, to possess them and to experiment with them ... truth seekers and wise men have been per- ´ secuted by powerful idiots in every age ...’ Mark A. Ludwig Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Article 19 of Universal Declaration of Human Rights The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they work. To do this, three aspects are covered ranging from theoretical fundamentals, to pr- tical applications and technical features; fully detailed, commented source 1 We will systematically use the plural form “viruses” instead of the litteral one “virii”. The latter is now an obsolete, though gramatically recommended, form. VIII Preface codes of viruses as well as inherent applications are proposed. So far, the applications-oriented aspects have hardly ever been addressed through the scarce existing literature devoted to computer viruses.
Computer viruses. --- Virus informatiques --- Engineering & Applied Sciences --- Computer Science --- Computer crimes. --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Software viruses --- Viruses, Computer --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Algebra. --- Ordered algebraic structures. --- Combinatorics. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Coding and Information Theory. --- Order, Lattices, Ordered Algebraic Structures. --- Crime --- Privacy, Right of --- Computer crimes --- Malware (Computer software) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Combinatorics --- Algebra --- Mathematical analysis --- Mathematics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information theory. --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Communication theory --- Communication --- Cybernetics
Choose an application
This 2005 book provides an analytic overview and assessment of the changing nature of crime in the burgeoning information society. Bringing together views from leading national and international authorities, Hedieh Nasheri explains the historical and theoretical background surrounding issues of economic espionage, trade secret theft and industrial spying and its impact on society. She looks at legislative history, the progression of electronic and corporate criminal behavior by introducing the concept of information theft and computer crimes, exploring its definition, its identification and its development within criminology. Nasheri presents an assessment of the state of economic espionage activities within a criminological context and based on that assessment addresses areas where additional action is required. The book also draws attention to a variety of issues raised by economic espionage and technological development. It draws on a variety of disciplines, including criminology, criminal justice, sociology, law and society, economics and political science.
Trade secrets. --- Computer crimes. --- Intellectual property. --- Commercial crimes. --- Secrets d'entreprises --- Criminalité informatique --- Propriété intellectuelle --- Infractions économiques --- 174.4 --- 347.77 --- Bedrijfsethiek. Zakenmoraal --- Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- Business intelligence. --- 347.77 Industrieel eigendomsrecht. Commercieel eigendomsrecht. Geestelijk eigendomsrecht --- 174.4 Bedrijfsethiek. Zakenmoraal --- Criminalité informatique --- Propriété intellectuelle --- Infractions économiques --- Business intelligence --- Commercial crimes --- Computer crimes --- Intellectual property --- Trade secrets --- Business secrets --- Commercial secrets --- Secrets, Trade --- Confidential business information --- Secrecy --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Corporate crime --- Crimes, Financial --- Financial crimes --- Offenses affecting the public trade --- Business espionage --- Competitive intelligence --- Corporate intelligence --- Economic espionage --- Espionage, Business --- Espionage, Economic --- Espionage, Industrial --- Industrial espionage --- Intelligence, Business --- Intelligence, Corporate --- Business ethics --- Competition, Unfair --- Industrial management --- Law and legislation --- Social Sciences --- Sociology
Choose an application
ADVANCES IN DIGITAL FORENSICS Edited by: Mark Pollitt and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance – investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues in Digital Forensics Investigative Techniques Network Forensics Portable Electronic Device Forensics Linux and File System Forensics Applications and Techniques This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
Forensic sciences --- Electronics in criminal investigation --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal --- Data processing --- Investigation --- Criminal evidence --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Criminalistics --- Forensic science --- Criminalistique --- Electronique dans les enquêtes criminelles --- Communication électronique des pièces --- Preuve (Droit pénal) --- Computer crimes -- Investigation -- Congresses. --- Electronic discovery (Law) -- Congresses. --- Electronics in criminal investigation -- Congresses. --- Evidence, Criminal -- Congresses. --- Forensic sciences -- Data processing -- Congresses. --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer organization. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Science, general. --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Information Storage and Retrieval. --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Discovery (Law) --- Science --- Crime --- Privacy, Right of --- Information Technology --- Computer Science (Hardware & Networks) --- Computer network architectures. --- Data structures (Computer science) --- Information storage and retrieva. --- Cryptology. --- Data Structures and Information Theory. --- Information retrieval. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Protection --- Security measures --- Information storage and retrieval systems. --- Data structures (Computer scienc. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Organization, Computer --- Electronic evidence --- Digital preservation
Listing 1 - 7 of 7 |
Sort by
|