Combating Security Breaches and Criminal Activity in the Digital Sphere

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, General Computing
Cover of the book Combating Security Breaches and Criminal Activity in the Digital Sphere by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522501954
Publisher: IGI Global Publication: June 9, 2016
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781522501954
Publisher: IGI Global
Publication: June 9, 2016
Imprint: Information Science Reference
Language: English
With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.

More books from IGI Global

Cover of the book Strategic Approaches to Successful Crowdfunding by
Cover of the book Management Engineering for Effective Healthcare Delivery by
Cover of the book Contemporary Identity and Access Management Architectures by
Cover of the book Multifaceted Approach to Digital Addiction and Its Treatment by
Cover of the book Research and Applications in Global Supercomputing by
Cover of the book Decentralized Computing Using Blockchain Technologies and Smart Contracts by
Cover of the book Non-Functional Properties in Service Oriented Architecture by
Cover of the book Valuing People and Technology in the Workplace by
Cover of the book Investigations into Living Systems, Artificial Life, and Real-World Solutions by
Cover of the book Methods for Analyzing and Leveraging Online Learning Data by
Cover of the book Analyzing Workplace Arrogance and Organizational Effectiveness by
Cover of the book Handbook of Research on Architectural Trends in Service-Driven Computing by
Cover of the book Encyclopedia of Mobile Phone Behavior by
Cover of the book Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security by
Cover of the book Collaborative Learning 2.0 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy