Showing 1 - 10 of 191
"Cyber behavior, such as e-learning, e-voting, e-shopping, e-privacy, and e-therapy, could be broadly considered as any … physical, social, or mental activities that humans engage in interacting with the Internet and that can be objectively observed … in cyber space. The Encyclopedia of Cyber Behavior is intended to offer the first, definitive, and most comprehensive …
Persistent link: https://www.econbiz.de/10011727360
This book provides an overview with basic definitions of cyber terrorism and information warfare, along with … to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and … information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism …
Persistent link: https://www.econbiz.de/10011725950
hacking, botnets, innovative cyber-attacks, cyber terrorism, cybersecurity trends, cyber offensive and defensive capability … strategic cybersecurity messaging online -- Chapter 11. Cyber resilience for the internet of things -- Chapter 12. Developing … -- Chapter 3. Ransomware: the cyber extortionist -- Chapter 4. Curtailing the threats to cloud computing in the fourth industrial …
Persistent link: https://www.econbiz.de/10012393206
1. Network security / Ramakrishna Thurimella, Leemon Baird -- 2. Cryptography-based authentication for protecting cyber …
Persistent link: https://www.econbiz.de/10011726908
technologies and developing practical solutions in cyber security, cyber crime and cyber forensics. … and security / C. Axelrod, Sukumar Haldar -- 3. A comparison of cyber-crime definitions in India and the United States … anomalies / Suja Ramachandran ... et al. -- 7. Securing next generation internet services / Asoke Talukder -- 8. An examination …
Persistent link: https://www.econbiz.de/10011727038
property in an age of open source and anonymity -- 4. E-governance on a global campus -- 5. How safe is your identity? -- 6 …
Persistent link: https://www.econbiz.de/10011727101
constraints / Rania Mokhtar and Rashid Saeed -- 4. Cyber security and privacy in the age of social networks / Babar Bhatti -- 5 …. Botnets and cyber security: battling online threats / Ahmed Mansour Manasrah ... [et al.] -- 6. Evaluation of contemporary … systems security / Muhammad Farooq-i-Azam and Muhammad Naeem Ayyaz -- 11. Cyber security in liquid petroleum pipelines …
Persistent link: https://www.econbiz.de/10011727149
"This book discusses the impact of cyber ethics and cyber law on information technologies and society, featuring …1. Responsibility, jurisdiction, and the future of "privacy by design" / Ugo Pagallo -- 2. Hacking: legal and ethical … here? / Anteneh Ayanso and Tejaswini Herath -- 5. Cyber law, cyber ethics and online gambling / Lee Gillam and Anna …
Persistent link: https://www.econbiz.de/10011727193
-- Role of cloud systems as enabler of global competitive advantages / Fawzy Soliman -- Cloud computing: IT governance, legal …
Persistent link: https://www.econbiz.de/10011727840
A brief review of new threats and countermeasures in digital crime and cyber terrorism / Maurice Dawson -- Mobile … devices: the case for cyber security hardened systems / Maurice Dawson, Jorja Wright, Marwan Omar -- Security threats on … / Darrell Norman Burrell [and 3 others] -- Communication, technology, and cyber crime in Sub-Saharan Africa / Dustin Bessette …
Persistent link: https://www.econbiz.de/10011728228