Filter
Datasvindel og hacking
Filter
With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management …
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships …
The government of the People's Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech …
The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimises computer systems. It is a computer security law. It protects federal computers, bank …
This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets …
Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the …
'Managing Cybersecurity Risk is a comprehensive and engrossing guide for organizations of any size' --Infosecurity Magazine Everything you need to know to protect from and react to …
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile …
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with …