Cyber crime, security and digital intelligence
In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards
Saved in:
| Main Author: | Johnson, Mark (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
[date of publication is not identified]
Gower Publishing
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)
by: Richards, Julian
Published: (2014)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
National security and counterintelligence in the era of cyber espionage
Published: (2016)
Published: (2016)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Policing digital crime
Published: (2014)
Published: (2014)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
Jenayah digital daripada penyelidikan kepada penyelesaian
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
A history of cyber security attacks 1980 to present
by: Middleton, Bruce
Published: (2017)
by: Middleton, Bruce
Published: (2017)
Managing cyber threats
Published: (2015)
Published: (2015)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
A study on the collaboration of cyber terror response policy of South Korea-U.S.
by: Lee, Eun Kyeong
by: Lee, Eun Kyeong
Digital evidence and computer crime forensic science,computers and the internet
by: Casey
Published: (2000)
by: Casey
Published: (2000)
Cybersecurity, botnets and cyberterrorism
by: Jacobson George V.
Published: (2009)
by: Jacobson George V.
Published: (2009)
Jenayah cinta cyber
by: Azianura Hani Shaari, et al.
Published: (2018)
by: Azianura Hani Shaari, et al.
Published: (2018)
Cyber warfare and terrorism concepts, methodologies, tools, and applications
Published: (2020)
Published: (2020)
Profiling hackers
by: Chiesa, Raoul 1973-
Published: (2009)
by: Chiesa, Raoul 1973-
Published: (2009)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Cyber war the next threat to national security and what to do about it
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Developments in information security and cybernetic wars
Published: (2019)
Published: (2019)
Islamophobia in cyberspace hate crimes go viral
Published: (2020)
Published: (2020)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
Cybercrime and society
by: Yar, Majid
Published: (2013)
by: Yar, Majid
Published: (2013)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
The use of cyberspace as a platform to conduct cyberterrorism a case study on ISIS
by: Ahmad Nizam Adnan
by: Ahmad Nizam Adnan
Cyber-attacks challenges in cyber security and impacts towards Asia military stability
by: Mohd Sanin Suparman
Published: (2019)
by: Mohd Sanin Suparman
Published: (2019)
Similar Items
-
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015) -
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018) -
Cyber insecurity navigating the perils of the next information age
Published: (2016) -
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015) -
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)


