Cyberspace and Cybersecurity
โ Scribed by George Kostopoulos
- Publisher
- Auerbach Publications
- Year
- 2017
- Tongue
- English
- Leaves
- 316
- Edition
- 2nd
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
โฆ Subjects
Internet, Groupware, & Telecommunications;Networking & Cloud Computing;Computers & Technology;Network Security;Networking & Cloud Computing;Computers & Technology;Security & Encryption;Cryptography;Encryption;Hacking;Network Security;Privacy & Online Safety;Security Certifications;Viruses;Computers & Technology;Computer Science;Algorithms;Artificial Intelligence;Database Storage & Design;Graphics & Visualization;Networking;Object-Oriented Software Design;Operating Systems;Programming Languages;S
๐ SIMILAR VOLUMES
Vulnerabilities in Information SystemsIntroductionMeasuring VulnerabilityAvoiding Vulnerabilities through Secure CodingMistakes Can Be GoodThreats ClassificationThreat Modeling ProcessSecurity Starts at HomeSecurity in ApplicationsInternational AwarenessExercisesVulnerabilities in the OrganizationIn
Presented from a criminal justice perspective,<strong>Cyberspace, Cybersecurity, and Cybercrime</strong>introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance? Are such security concerns real, exaggerated or just p
<p>Cyberspace, the cyborg and cyberpunk have given feminists new imaginative possibilities for thinking about embodiment and identity in relation to technology. This is the first anthology of the key essays on these potent metaphors. Divided into three sections (Technology, Embodiment and Cyberspace
Cyberspace, the cyborg and cyberpunk have given feminists new imaginative possibilities for thinking about embodiment and identity in relation to technology. This is the first anthology of the key essays on these potent metaphors.