Cyber Security [3 volumes]
Protecting Businesses, Individuals, and the Government from the Next Cyber Attacks
Seiten
2016
Praeger Publishers Inc (Verlag)
978-1-4408-3025-9 (ISBN)
Praeger Publishers Inc (Verlag)
978-1-4408-3025-9 (ISBN)
- Keine Verlagsinformationen verfügbar
- Artikel merken
This three-volume set covers the full scope of cybersecurity issues-from cyberwarfare to fraudulent email schemes-and the role of businesses, consumers, and the government in preventing, detecting, and policing these activities.
This three-volume set covers the full scope of cybersecurity issues—from cyberwarfare to fraudulent email schemes—and the role of businesses, consumers, and the government in preventing, detecting, and policing these activities.
Cyber attacks disturb business operations, leak confidential information, and disrupt organizations, government agencies, and individuals on a daily basis. In this revealing work, experienced policymakers, security practitioners, and academic experts explain ways to combat current and future cyber attacks through technology. The inclusion of recent cybercrime case studies in the book serves to showcase current crime methodologies, incident response, investigative procedures, and forensic analysis and techniques.
The first volume of the set focuses on cybersecurity issues that impact government as well as the government's role in managing the nation's digital security. The second volume addresses the security issues that affect the private sector, particularly businesses engaged in technology endeavors. The third volume considers issues that impact consumers as well as users of social media and other communication tools. This comprehensive resource provides strategies for early identification and prevention of future attacks, and proposes workable solutions for maintaining a secure data environment.
• Highlights the roles and responsibilities of businesses—both private and public—and consumer sectors in the prevention and detection of cybersecurity
• Features contributions from experts drawn from various levels of government, business, and technology
• Reveals methods for legally profiling cybercriminals
• Offers solutions for preventing cyber attacks and data breaches in government, in businesses, and on personal digital devices
• Discusses the use of social engineering and phishing techniques to obtain critical information, including classified or sensitive access data, for network and database intrusion and economic espionage
This three-volume set covers the full scope of cybersecurity issues—from cyberwarfare to fraudulent email schemes—and the role of businesses, consumers, and the government in preventing, detecting, and policing these activities.
Cyber attacks disturb business operations, leak confidential information, and disrupt organizations, government agencies, and individuals on a daily basis. In this revealing work, experienced policymakers, security practitioners, and academic experts explain ways to combat current and future cyber attacks through technology. The inclusion of recent cybercrime case studies in the book serves to showcase current crime methodologies, incident response, investigative procedures, and forensic analysis and techniques.
The first volume of the set focuses on cybersecurity issues that impact government as well as the government's role in managing the nation's digital security. The second volume addresses the security issues that affect the private sector, particularly businesses engaged in technology endeavors. The third volume considers issues that impact consumers as well as users of social media and other communication tools. This comprehensive resource provides strategies for early identification and prevention of future attacks, and proposes workable solutions for maintaining a secure data environment.
• Highlights the roles and responsibilities of businesses—both private and public—and consumer sectors in the prevention and detection of cybersecurity
• Features contributions from experts drawn from various levels of government, business, and technology
• Reveals methods for legally profiling cybercriminals
• Offers solutions for preventing cyber attacks and data breaches in government, in businesses, and on personal digital devices
• Discusses the use of social engineering and phishing techniques to obtain critical information, including classified or sensitive access data, for network and database intrusion and economic espionage
George E. Curtis, JD, is professor emeritus of criminal justice at Utica College. Chet Hosmer is a visiting professor in the cybersecurity graduate program at Utica College.
| Erscheint lt. Verlag | 31.10.2016 |
|---|---|
| Zusatzinfo | 90 Illustrations |
| Sprache | englisch |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Sozialwissenschaften ► Politik / Verwaltung | |
| ISBN-10 | 1-4408-3025-8 / 1440830258 |
| ISBN-13 | 978-1-4408-3025-9 / 9781440830259 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
CHF 27,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95