el cat en
База данных: ELS EBSCO eBook
Page 1, Results: 15
Отмеченные записи: 0
1.
Подробнее
DDC 364.16/8
L 96
Lusthaus, Jonathan, (1984-).
Industry of anonymity : : inside the business of cybercrime / / Jonathan Lusthaus. - 2847838699978916693. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource (289 pages) : : il ( час. мин.), 2847838699978916693. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/3C1684F2-6153-41A0-A11D-CF5172DDCF6D. - ISBN 9780674989047 (electronic bk.). - ISBN 067498904X (electronic bk.)
Print version record.
Параллельные издания: Print version: : Lusthaus, Jonathan, 1984- Industry of anonymity. - Cambridge, Massachusetts : Harvard University Press, 2018. - ISBN 9780674979413
Содержание:
From lone wolves to industrialization -- Making sense of the cybercrime industry -- Nicknames and identity -- How cybercriminals cooperate online -- The offline dimension -- Cybercrime, organized crime, and governance.
~РУБ DDC 364.16/8
Рубрики: Computer crimes.
Hackers.
Online identities.
Organized crime.
SOCIAL SCIENCE--Criminology.
Computer crimes.
Hackers.
Online identities.
Organized crime.
SOCIAL SCIENCE / Criminology
Аннотация: Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.--
L 96
Lusthaus, Jonathan, (1984-).
Industry of anonymity : : inside the business of cybercrime / / Jonathan Lusthaus. - 2847838699978916693. - Cambridge, Massachusetts : : Harvard University Press,, ©2018. - 1 online resource (289 pages) : : il ( час. мин.), 2847838699978916693. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/3C1684F2-6153-41A0-A11D-CF5172DDCF6D. - ISBN 9780674989047 (electronic bk.). - ISBN 067498904X (electronic bk.)
Print version record.
Параллельные издания: Print version: : Lusthaus, Jonathan, 1984- Industry of anonymity. - Cambridge, Massachusetts : Harvard University Press, 2018. - ISBN 9780674979413
Содержание:
From lone wolves to industrialization -- Making sense of the cybercrime industry -- Nicknames and identity -- How cybercriminals cooperate online -- The offline dimension -- Cybercrime, organized crime, and governance.
Рубрики: Computer crimes.
Hackers.
Online identities.
Organized crime.
SOCIAL SCIENCE--Criminology.
Computer crimes.
Hackers.
Online identities.
Organized crime.
SOCIAL SCIENCE / Criminology
Аннотация: Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.--
2.
Подробнее
DDC 364.16/80973
N 73
Noble, Jennifer C. ,
White collar and financial crimes : : a casebook of fraudsters, scam artists, and corporate thieves / / Jennifer C. Noble. - Oakland, California : : University of California Press,, [2021]. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/555EF3E5-2079-46B7-8FFE-85C06E3D003B. - ISBN 0520972619 (electronic book). - ISBN 9780520972612 (electronic bk.)
Description based on online resource; title from digital title page (viewed on January 26, 2021).
Параллельные издания: Print version: : Noble, Jennifer C. White collar and financial crimes. - Oakland, California : University of California Press, [2021]. - ISBN 9780520302884
Содержание:
Embezzlement -- Mortgage fraud -- Ponzi schemes -- Healthcare fraud -- Cybercrimes -- Corporate fraud -- Money laundering -- Environmental crimes -- Foreign Corrupt Practice Act -- Insider trading -- Academic fraud -- False advertising
~РУБ DDC 364.16/80973
Рубрики: White collar crimes--United States
Commercial crimes--United States
Swindlers and swindling--United States
Deceptive advertising--United States
Computer crimes--United States
SOCIAL SCIENCE / Criminology
Commercial crimes
Computer crimes
Deceptive advertising
Swindlers and swindling
White collar crimes
United States
Аннотация: "Examining a shocking array of fraud, corruption, theft, and embezzlement cases, this vivid collection reveals the practice of detecting, investigating, prosecuting, defending, and resolving white-collar crimes. Each chapter is a case study of an illustrative criminal case and draws on extensive public records around obscure and high-profile crimes of the powerful, such as money laundering, mortgage fraud, public corruption, securities fraud, environmental crimes, and Ponzi schemes. Organized around a consistent analytic framework, every case tells a unique story and provides an engaging introduction to these complex crimes, while also introducing students to the practical aspects of investigation and prosecution of white-collar offenses. Jennifer Noble's text takes students to the front lines of these vastly understudied crimes, preparing them for future practice and policy work"--
N 73
Noble, Jennifer C. ,
White collar and financial crimes : : a casebook of fraudsters, scam artists, and corporate thieves / / Jennifer C. Noble. - Oakland, California : : University of California Press,, [2021]. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/555EF3E5-2079-46B7-8FFE-85C06E3D003B. - ISBN 0520972619 (electronic book). - ISBN 9780520972612 (electronic bk.)
Description based on online resource; title from digital title page (viewed on January 26, 2021).
Параллельные издания: Print version: : Noble, Jennifer C. White collar and financial crimes. - Oakland, California : University of California Press, [2021]. - ISBN 9780520302884
Содержание:
Embezzlement -- Mortgage fraud -- Ponzi schemes -- Healthcare fraud -- Cybercrimes -- Corporate fraud -- Money laundering -- Environmental crimes -- Foreign Corrupt Practice Act -- Insider trading -- Academic fraud -- False advertising
Рубрики: White collar crimes--United States
Commercial crimes--United States
Swindlers and swindling--United States
Deceptive advertising--United States
Computer crimes--United States
SOCIAL SCIENCE / Criminology
Commercial crimes
Computer crimes
Deceptive advertising
Swindlers and swindling
White collar crimes
United States
Аннотация: "Examining a shocking array of fraud, corruption, theft, and embezzlement cases, this vivid collection reveals the practice of detecting, investigating, prosecuting, defending, and resolving white-collar crimes. Each chapter is a case study of an illustrative criminal case and draws on extensive public records around obscure and high-profile crimes of the powerful, such as money laundering, mortgage fraud, public corruption, securities fraud, environmental crimes, and Ponzi schemes. Organized around a consistent analytic framework, every case tells a unique story and provides an engaging introduction to these complex crimes, while also introducing students to the practical aspects of investigation and prosecution of white-collar offenses. Jennifer Noble's text takes students to the front lines of these vastly understudied crimes, preparing them for future practice and policy work"--
3.
Подробнее
DDC 005.8
R 45
Research anthology on securing mobile technologies and applications / / Information Resource Management Association, USA. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xxix, 837 pages) : : il. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/3E93BD7A-5489-4FA1-B6FA-1DB0A3173E55. - ISBN 1799886018 (electronic book). - ISBN 1799886026 (electronic bk.). - ISBN 9781799886020 (electronic bk.). - ISBN 9781799886013 (electronic bk.)
"Critical Explorations" -- taken from front cover. Description based on online resource; title from digital title page (viewed on May 04, 2021).
Параллельные издания: Print version: : Research anthology on securing mobile technologies and applications. - Hershey, PA : Information Science Reference, [2021]. - ISBN 9781799885450
~РУБ DDC 005.8
Рубрики: Mobile computing--Security measures.
Cell phone systems--Security measures.
Computer crimes--Prevention.
Computer crimes--Prevention.
Аннотация: "This book includes a variety of contributions that seek to fill the void for an all-encompassing and comprehensive reference book covering the latest and most emerging research, concepts, and theories for preventing, identifying, and mitigating the spread of fake news both within a human and technological context"--
Доп.точки доступа:
Information Resources Management Association,
R 45
Research anthology on securing mobile technologies and applications / / Information Resource Management Association, USA. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xxix, 837 pages) : : il. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/3E93BD7A-5489-4FA1-B6FA-1DB0A3173E55. - ISBN 1799886018 (electronic book). - ISBN 1799886026 (electronic bk.). - ISBN 9781799886020 (electronic bk.). - ISBN 9781799886013 (electronic bk.)
"Critical Explorations" -- taken from front cover. Description based on online resource; title from digital title page (viewed on May 04, 2021).
Параллельные издания: Print version: : Research anthology on securing mobile technologies and applications. - Hershey, PA : Information Science Reference, [2021]. - ISBN 9781799885450
Рубрики: Mobile computing--Security measures.
Cell phone systems--Security measures.
Computer crimes--Prevention.
Computer crimes--Prevention.
Аннотация: "This book includes a variety of contributions that seek to fill the void for an all-encompassing and comprehensive reference book covering the latest and most emerging research, concepts, and theories for preventing, identifying, and mitigating the spread of fake news both within a human and technological context"--
Доп.точки доступа:
Information Resources Management Association,
4.
Подробнее
DDC 364.16/8
S 82
Steinmetz, Kevin F. ,
Hacked : : a radical approach to hacker culture and crime / / Kevin F. Steinmetz. - New York : : New York University Press,, [2016]. - 1 online resource. - (Alternative criminology series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/E511BD16-D292-4E2A-AE31-F6AD30894D9F. - ISBN 9781479898435 (electronic bk.). - ISBN 1479898430 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Steinmetz, Kevin F. Hacked. - New York : New York University Press, [2016]. - ISBN 9781479866106
Содержание:
Acknowledgments -- Introduction: toward a radical criminology of hackers -- Setting the stage -- The front end of hacking -- Craft(y)ness -- On authority and protocol -- The radical turn -- The [hack] mode of production -- Crafting a crackdown -- Conclusion -- Appendix: field research lists -- Notes -- References -- Index -- About the author.
~РУБ DDC 364.16/8
Рубрики: Computer crimes--Economic aspects.
Computer crimes--Social aspects.
Hackers.
SOCIAL SCIENCE / Criminology
S 82
Steinmetz, Kevin F. ,
Hacked : : a radical approach to hacker culture and crime / / Kevin F. Steinmetz. - New York : : New York University Press,, [2016]. - 1 online resource. - (Alternative criminology series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/E511BD16-D292-4E2A-AE31-F6AD30894D9F. - ISBN 9781479898435 (electronic bk.). - ISBN 1479898430 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Steinmetz, Kevin F. Hacked. - New York : New York University Press, [2016]. - ISBN 9781479866106
Содержание:
Acknowledgments -- Introduction: toward a radical criminology of hackers -- Setting the stage -- The front end of hacking -- Craft(y)ness -- On authority and protocol -- The radical turn -- The [hack] mode of production -- Crafting a crackdown -- Conclusion -- Appendix: field research lists -- Notes -- References -- Index -- About the author.
Рубрики: Computer crimes--Economic aspects.
Computer crimes--Social aspects.
Hackers.
SOCIAL SCIENCE / Criminology
5.
Подробнее
DDC 005.8/2
C 85
Countering cyber attacks and preserving the integrity and availability of critical systems / / S. Geetha and Asnath Victy Phamila, editors. - Hershey, PA : : Information Science Reference,, ©2019. - 1 online resource. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/93B40E9F-FC02-411B-A041-4AE312029447. - ISBN 9781522582427 (electronic bk.). - ISBN 1522582428 (electronic bk.)
Online resource; title from PDF title page (EBSCO, viewed February 4, 2019)
~РУБ DDC 005.8/2
Рубрики: Computer networks--Security measures.
Computer crimes--Prevention.
Computer security.
COMPUTERS / Security / General.
COMPUTERS / Security / Networking.
Аннотация: "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--
Доп.точки доступа:
Geetha, S., (1979-) \editor.\
Phamila, Asnath Victy, (1978-) \editor.\
C 85
Countering cyber attacks and preserving the integrity and availability of critical systems / / S. Geetha and Asnath Victy Phamila, editors. - Hershey, PA : : Information Science Reference,, ©2019. - 1 online resource. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/93B40E9F-FC02-411B-A041-4AE312029447. - ISBN 9781522582427 (electronic bk.). - ISBN 1522582428 (electronic bk.)
Online resource; title from PDF title page (EBSCO, viewed February 4, 2019)
Рубрики: Computer networks--Security measures.
Computer crimes--Prevention.
Computer security.
COMPUTERS / Security / General.
COMPUTERS / Security / Networking.
Аннотация: "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--
Доп.точки доступа:
Geetha, S., (1979-) \editor.\
Phamila, Asnath Victy, (1978-) \editor.\
6.
Подробнее
DDC 006.3/1
H 22
Handbook of research on machine and deep learning applications for cyber security / / Padmavathi Ganapathi and D. Shanmugapriya, editors. - 4018/978-1-5225-9611-0. - Hershey, PA : : IGI Global,, [2020]. - 1 online resource (482 pages) ( час. мин.), 4018/978-1-5225-9611-0. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/FE415765-1FDE-468A-8AB9-52350B19F382. - ISBN 1522596135 (electronic book). - ISBN 9781522596141 (electronic book). - ISBN 1522596143 (electronic book). - ISBN 9781522596134 (electronic bk.)
Description based on online resource; title from digital title page (viewed on September 03, 2019).
Параллельные издания: Print version: :
Содержание:
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
~РУБ DDC 006.3/1
Рубрики: Computer networks--Security measures.
Computer security--Data processing.
Computer crimes--Prevention--Data processing.
Machine learning.
Аннотация: "This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
Доп.точки доступа:
Ganapathi, Padmavathi, (1964-) \editor.\
Shanmugapriya, D., (1978-) \editor.\
IGI Global,
H 22
Handbook of research on machine and deep learning applications for cyber security / / Padmavathi Ganapathi and D. Shanmugapriya, editors. - 4018/978-1-5225-9611-0. - Hershey, PA : : IGI Global,, [2020]. - 1 online resource (482 pages) ( час. мин.), 4018/978-1-5225-9611-0. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/FE415765-1FDE-468A-8AB9-52350B19F382. - ISBN 1522596135 (electronic book). - ISBN 9781522596141 (electronic book). - ISBN 1522596143 (electronic book). - ISBN 9781522596134 (electronic bk.)
Description based on online resource; title from digital title page (viewed on September 03, 2019).
Параллельные издания: Print version: :
Содержание:
Chapter 1. Review on intelligent algorithms for cyber security -- Chapter 2. A review on cyber security mechanisms using machine and deep learning algorithms -- Chapter 3. Review on machine and deep learning applications for cyber security -- Chapter 4. Applications of machine learning in cyber security domain -- Chapter 5. Applications of machine learning in cyber security -- Chapter 6. Malware and anomaly detection using machine learning and deep learning methods -- Chapter 7. Cyber threats detection and mitigation using machine learning -- Chapter 8. Hybridization of machine learning algorithm in intrusion detection system -- Chapter 9. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning -- Chapter 10. Anomaly-based intrusion detection: adapting to present and forthcoming communication environments -- Chapter 11. Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN) -- Chapter 12. A novel biometric image enhancement approach with the hybridization of undecimated wavelet transform and deep autoencoder -- Chapter 13. A 3D-cellular automata-based publicly-verifiable threshold secret sharing -- Chapter 14. Big data analytics for intrusion detection: an overview -- Chapter 15. Big data analytics with machine learning and deep learning methods for detection of anomalies in network traffic -- Chapter 16. A secure protocol for high-dimensional big data providing data privacy -- Chapter 17. A review of machine learning methods applied for handling zero-day attacks in the cloud environment -- Chapter 18. Adoption of machine learning with adaptive approach for securing CPS -- Chapter 19. Variable selection method for regression models using computational intelligence techniques.
Рубрики: Computer networks--Security measures.
Computer security--Data processing.
Computer crimes--Prevention--Data processing.
Machine learning.
Аннотация: "This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
Доп.точки доступа:
Ganapathi, Padmavathi, (1964-) \editor.\
Shanmugapriya, D., (1978-) \editor.\
IGI Global,
7.
Подробнее
DDC 363.25/2
J 74
Johansen, Gerard,.
Digital forensics and incident response : : incident response techniques and procedures to respond to modern cyber threats / / Gerard Johansen. - Second edition. - Birmingham : : Packt Publishing Ltd.,, 2020. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/7ACC4493-04BC-4EF7-9431-B0706493622A. - ISBN 9781838644086 (electronic book). - ISBN 1838644083 (electronic book)
Description based on online resource; title from digital title page (viewed on April 15, 2020).
~РУБ DDC 363.25/2 + DDC 363.25
Рубрики: Digital forensic science.
Computer networks--Security measures.
Computer crimes--Investigation.
Forensic sciences--Data processing.
J 74
Johansen, Gerard,.
Digital forensics and incident response : : incident response techniques and procedures to respond to modern cyber threats / / Gerard Johansen. - Second edition. - Birmingham : : Packt Publishing Ltd.,, 2020. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/7ACC4493-04BC-4EF7-9431-B0706493622A. - ISBN 9781838644086 (electronic book). - ISBN 1838644083 (electronic book)
Description based on online resource; title from digital title page (viewed on April 15, 2020).
Рубрики: Digital forensic science.
Computer networks--Security measures.
Computer crimes--Investigation.
Forensic sciences--Data processing.
8.
Подробнее
DDC 005.8
E 84
Ethical hacking techniques and countermeasures for cybercrime prevention / / Nabie Y. Conteh. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xviii, 168 pages) : : il. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/9C539D1D-6E90-45EC-84DF-F5DB267188DB. - ISBN 9781799865063 (electronic book). - ISBN 1799865061 (electronic book). - ISBN 9781799865070 (electronic bk.). - ISBN 179986507X (electronic bk.)
"Premier Reference Source" -- taken from front cover. Description based on online resource; title from digital title page (viewed on August 24, 2021).
Параллельные издания: Print version: : Ethical hacking techniques and countermeasures for cybercrime prevention. - Hershey, PA : Information Science Reference, an imprint of IGI Global, 2021. - ISBN 9781799865049
Содержание:
Chapter 1. Ethical hacking, threats, and vulnerabilities in cybersecurity -- Chapter 2. Cybersecurity risks, vulnerabilities, and countermeasures to prevent social engineering attacks -- Chapter 3. The unprecedented rise in cybercrime and the role of the human vulnerability factor -- Chapter 4. Evaluating the impact of cybertheft through social engineering and network intrusions -- Chapter 5. Industry trends in computer software -- Chapter 6. The analysis of top cyber investigation trends -- Chapter 7. Emerging trends in the mitigation of data security of consumer devices industry -- Chapter 8. DWT-based steganography for image transmission -- Chapter 9. The socio-economic impact of identity theft and cybercrime: preventive measures and solutions -- Chapter 10. Essential security elements and phases of hacking attacks -- Chapter 11. The dynamics of social engineering and cybercrime in the digital age.
~РУБ DDC 005.8
Рубрики: Penetration testing (Computer security)
Computer crimes--Prevention.
Computer crimes--Prevention.
Penetration testing (Computer security)
Аннотация: "This edited book serves as a guide for certification training, the study of countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft and computer related crimes"--
Доп.точки доступа:
Conteh, Nabie, (1960-) \editor.\
E 84
Ethical hacking techniques and countermeasures for cybercrime prevention / / Nabie Y. Conteh. - Hershey, PA : : Information Science Reference, an imprint of IGI Global,, [2021]. - 1 online resource (xviii, 168 pages) : : il. - (Advances in information security, privacy, and ethics (AISPE) book series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/9C539D1D-6E90-45EC-84DF-F5DB267188DB. - ISBN 9781799865063 (electronic book). - ISBN 1799865061 (electronic book). - ISBN 9781799865070 (electronic bk.). - ISBN 179986507X (electronic bk.)
"Premier Reference Source" -- taken from front cover. Description based on online resource; title from digital title page (viewed on August 24, 2021).
Параллельные издания: Print version: : Ethical hacking techniques and countermeasures for cybercrime prevention. - Hershey, PA : Information Science Reference, an imprint of IGI Global, 2021. - ISBN 9781799865049
Содержание:
Chapter 1. Ethical hacking, threats, and vulnerabilities in cybersecurity -- Chapter 2. Cybersecurity risks, vulnerabilities, and countermeasures to prevent social engineering attacks -- Chapter 3. The unprecedented rise in cybercrime and the role of the human vulnerability factor -- Chapter 4. Evaluating the impact of cybertheft through social engineering and network intrusions -- Chapter 5. Industry trends in computer software -- Chapter 6. The analysis of top cyber investigation trends -- Chapter 7. Emerging trends in the mitigation of data security of consumer devices industry -- Chapter 8. DWT-based steganography for image transmission -- Chapter 9. The socio-economic impact of identity theft and cybercrime: preventive measures and solutions -- Chapter 10. Essential security elements and phases of hacking attacks -- Chapter 11. The dynamics of social engineering and cybercrime in the digital age.
Рубрики: Penetration testing (Computer security)
Computer crimes--Prevention.
Computer crimes--Prevention.
Penetration testing (Computer security)
Аннотация: "This edited book serves as a guide for certification training, the study of countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft and computer related crimes"--
Доп.точки доступа:
Conteh, Nabie, (1960-) \editor.\
9.
Подробнее
DDC 005.8
M 24
Management Association, Association, Information Resources.
Research Anthology on Business Aspects of Cybersecurity [[electronic resource].] / Association, Information Resources. Management Association. - Hershey : : IGI Global,, 2021. - 1 online resource (714 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/29408F14-D6B6-4A23-9A4C-DAE9B507BC37. - ISBN 1668437007. - ISBN 9781668437001 (electronic bk.)
Description based upon print version of record.
Параллельные издания: Print version: : Management Association, Information Resources Research Anthology on Business Aspects of Cybersecurity. - Hershey : IGI Global,c2021. - ISBN 9781668436981
Содержание:
Title Page -- Copyright Page -- Editorial Advisory Board -- List of Contributors -- Table of Contents -- Preface -- Section 1: Cybersecurity Audits and Risk Assessment -- Chapter 1: Audits in Cybersecurity -- Chapter 2: Auditor Evaluation and Reporting on Cybersecurity Risks -- Chapter 3: The NIST Cybersecurity Framework -- Chapter 4: A Hybrid Asset-Based IT Risk Management Framework -- Chapter 5: The CyberSecurity Audit Model (CSAM) -- Chapter 6: The Two-Dimensional CCSMM -- Chapter 7: Threat and Risk Assessment Using Continuous Logic
Section 2: Organizational Awareness and Cybersecurity Training -- Chapter 8: Interdisciplinary Training and Mentoring for Cyber Security in Companies -- Chapter 9: SETA and Security Behavior -- Chapter 10: Factors Influencing Information Security Policy Compliance Behavior -- Chapter 11: Achieving a Security Culture -- Chapter 12: Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy -- Chapter 13: The Role of Education and Awareness in Tackling Insider Threats
Chapter 14: The Role of Human Resource Management in Enhancing Organizational Information Systems Security -- Chapter 15: Identifying HRM Practices for Improving Information Security Performance -- Chapter 16: Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers -- Chapter 17: Towards a Student Security Compliance Model (SSCM) -- Chapter 18: Internal Marketing Cybersecurity-Conscious Culture -- Chapter 19: Raising Information Security Awareness in the Field of Urban and Regional Planning
Chapter 20: A Comparative Study in Israel and Slovenia Regarding the Awareness, Knowledge, and Behavior Regarding Cyber Security -- Section 3: Securing and Managing Cybersecurity Threats -- Chapter 21: Enterprise Security -- Chapter 22: Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents -- Chapter 23: National Cybersecurity Strategies -- Chapter 24: Network and Data Transfer Security Management in Higher Educational Institutions -- Chapter 25: Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
Chapter 26: Challenges in Securing Industrial Control Systems Using Future Internet Technologies -- Chapter 27: Security Framework for Supply-Chain Management -- Chapter 28: Cybersecurity Incident Response and Management -- Chapter 29: Lawful Trojan Horse -- Chapter 30: Modeling a Cyber Defense Business Ecosystem of Ecosystems -- Chapter 31: The Challenges and Solutions of Cybersecurity Among Malaysian Companies -- Index
~РУБ DDC 005.8
Рубрики: Data protection.
Computer security.
Computer crimes--Prevention.
Business enterprises--Security measures.
Аннотация: Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the.
M 24
Management Association, Association, Information Resources.
Research Anthology on Business Aspects of Cybersecurity [[electronic resource].] / Association, Information Resources. Management Association. - Hershey : : IGI Global,, 2021. - 1 online resource (714 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/29408F14-D6B6-4A23-9A4C-DAE9B507BC37. - ISBN 1668437007. - ISBN 9781668437001 (electronic bk.)
Description based upon print version of record.
Параллельные издания: Print version: : Management Association, Information Resources Research Anthology on Business Aspects of Cybersecurity. - Hershey : IGI Global,c2021. - ISBN 9781668436981
Содержание:
Title Page -- Copyright Page -- Editorial Advisory Board -- List of Contributors -- Table of Contents -- Preface -- Section 1: Cybersecurity Audits and Risk Assessment -- Chapter 1: Audits in Cybersecurity -- Chapter 2: Auditor Evaluation and Reporting on Cybersecurity Risks -- Chapter 3: The NIST Cybersecurity Framework -- Chapter 4: A Hybrid Asset-Based IT Risk Management Framework -- Chapter 5: The CyberSecurity Audit Model (CSAM) -- Chapter 6: The Two-Dimensional CCSMM -- Chapter 7: Threat and Risk Assessment Using Continuous Logic
Section 2: Organizational Awareness and Cybersecurity Training -- Chapter 8: Interdisciplinary Training and Mentoring for Cyber Security in Companies -- Chapter 9: SETA and Security Behavior -- Chapter 10: Factors Influencing Information Security Policy Compliance Behavior -- Chapter 11: Achieving a Security Culture -- Chapter 12: Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy -- Chapter 13: The Role of Education and Awareness in Tackling Insider Threats
Chapter 14: The Role of Human Resource Management in Enhancing Organizational Information Systems Security -- Chapter 15: Identifying HRM Practices for Improving Information Security Performance -- Chapter 16: Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers -- Chapter 17: Towards a Student Security Compliance Model (SSCM) -- Chapter 18: Internal Marketing Cybersecurity-Conscious Culture -- Chapter 19: Raising Information Security Awareness in the Field of Urban and Regional Planning
Chapter 20: A Comparative Study in Israel and Slovenia Regarding the Awareness, Knowledge, and Behavior Regarding Cyber Security -- Section 3: Securing and Managing Cybersecurity Threats -- Chapter 21: Enterprise Security -- Chapter 22: Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents -- Chapter 23: National Cybersecurity Strategies -- Chapter 24: Network and Data Transfer Security Management in Higher Educational Institutions -- Chapter 25: Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
Chapter 26: Challenges in Securing Industrial Control Systems Using Future Internet Technologies -- Chapter 27: Security Framework for Supply-Chain Management -- Chapter 28: Cybersecurity Incident Response and Management -- Chapter 29: Lawful Trojan Horse -- Chapter 30: Modeling a Cyber Defense Business Ecosystem of Ecosystems -- Chapter 31: The Challenges and Solutions of Cybersecurity Among Malaysian Companies -- Index
Рубрики: Data protection.
Computer security.
Computer crimes--Prevention.
Business enterprises--Security measures.
Аннотация: Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the.
10.
Подробнее
DDC 364.16/8
R 28
Rawat, Romil.
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence [[electronic resource].] / Romil. Rawat, Telang, Shrikant., William, P., Kaur, Upinder., C.U., Om Kumar. - Hershey : : IGI Global,, 2022. - 1 online resource (300 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/8D0C9455-B8FF-4F58-BAA3-ED3679F820AA. - ISBN 166843945X. - ISBN 9781668439456 (electronic bk.)
Description based upon print version of record.
Параллельные издания: Print version: : Rawat, Romil Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence. - Hershey : IGI Global,c2022. - ISBN 9781668439425
~РУБ DDC 364.16/8
Рубрики: Computer crimes--Investigation.
Dark Web.
Аннотация: Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence tha.
Доп.точки доступа:
Telang, Shrikant.
William, P.
Kaur, Upinder.
C.U., Om Kumar.
R 28
Rawat, Romil.
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence [[electronic resource].] / Romil. Rawat, Telang, Shrikant., William, P., Kaur, Upinder., C.U., Om Kumar. - Hershey : : IGI Global,, 2022. - 1 online resource (300 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/8D0C9455-B8FF-4F58-BAA3-ED3679F820AA. - ISBN 166843945X. - ISBN 9781668439456 (electronic bk.)
Description based upon print version of record.
Параллельные издания: Print version: : Rawat, Romil Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence. - Hershey : IGI Global,c2022. - ISBN 9781668439425
Рубрики: Computer crimes--Investigation.
Dark Web.
Аннотация: Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence tha.
Доп.точки доступа:
Telang, Shrikant.
William, P.
Kaur, Upinder.
C.U., Om Kumar.
Page 1, Results: 15