Sailing safe in cyberspace protect your identity and data
Looking at safe computing, this text gives in-depth exposure to the various ways in which security of information on computers might be compromised, how cyber crime markets work and measures to ensure safety at individual and organizational levels.
Saved in:
| Main Author: | Kaushik, Anjali |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New Delhi
Sage Publications
2013.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | HV 8079 .C65 .K38 2013 |
Similar Items
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Intelligence-driven incident response outwitting the adversary
by: Roberts, Scott J., et al.
Published: (2017)
by: Roberts, Scott J., et al.
Published: (2017)
Digital archaeology the art and science of digital forensics
by: Graves, Michael (Michael W.)
Published: (2014)
by: Graves, Michael (Michael W.)
Published: (2014)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Cloud storage forensics
by: Quick, Darren
Published: (2014)
by: Quick, Darren
Published: (2014)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Deterrence in the cyberspace the quest for red-line against cyber threats
by: Chan, Yongxue Duncan
by: Chan, Yongxue Duncan
Policing digital crime
Published: (2014)
Published: (2014)
Islamophobia in cyberspace hate crimes go viral
Published: (2020)
Published: (2020)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Counterterrorism reassessing the policy response
by: Gomis, Benoit
Published: (2016)
by: Gomis, Benoit
Published: (2016)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Transnational Organized Crime as a threat to Malaysia an analysis
by: Satish Kumar Suppiah
Published: (2019)
by: Satish Kumar Suppiah
Published: (2019)
Critical perspectives on counter-terrorism
Published: (2015)
Published: (2015)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Crime prevention theory and practice
by: Schneider, Stephen
Published: (2015)
by: Schneider, Stephen
Published: (2015)
Ninja hacking unconventional penetration testing tactics and techniques
by: Wilhelm, Thomas
Published: (2011)
by: Wilhelm, Thomas
Published: (2011)
Political terrorism theory, tactics, and counter-measures
by: Wardlaw lhGrant
by: Wardlaw lhGrant
Crime prevention through environmental design
by: Crowe, Timothy D
Published: (2013)
by: Crowe, Timothy D
Published: (2013)
Spies among us how to stop the spies, terrorists, hackers, and criminals you don't even know you encounter every day
by: Winkler, Ira
Published: (2005)
by: Winkler, Ira
Published: (2005)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Ending terrorism lessons for defeating al-Qaeda
by: Cronin ,Audrey Kurth 1958-
Published: (2008)
by: Cronin ,Audrey Kurth 1958-
Published: (2008)
Emerging trends in ICT security
Published: (2014)
Published: (2014)
The enhancement of logistics supply system in Asean disaster area
by: Ahmad Amir Shahidan
Published: (2019)
by: Ahmad Amir Shahidan
Published: (2019)
Identity theft breakthroughs in research and practice
Published: (2017)
Published: (2017)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy
by: Engebretson, Pat (Patrick Henry)
Published: (2013)
by: Engebretson, Pat (Patrick Henry)
Published: (2013)
Terrorism versus democracy the liberal state response
by: Wilkinson, Paul
Published: (2011)
by: Wilkinson, Paul
Published: (2011)
The Russian mafia private protection in a new market economy
by: Verese
Published: (2001)
by: Verese
Published: (2001)
Protecting our ports domestic and international politics of containerized freight security
by: Grillot, Suzette, et al.
Published: (2010)
by: Grillot, Suzette, et al.
Published: (2010)
Handbook of research on modern cryptographic solutions for computer and cyber security
Published: (2016)
Published: (2016)
National Cyber Security Policy enhancing the cooperation between public and private agencies
by: Fairuzeyaza Yahaya
Published: (2019)
by: Fairuzeyaza Yahaya
Published: (2019)
Similar Items
-
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014) -
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016) -
Intelligence-driven incident response outwitting the adversary
by: Roberts, Scott J., et al.
Published: (2017) -
Digital archaeology the art and science of digital forensics
by: Graves, Michael (Michael W.)
Published: (2014) -
Cybersecurity public sector threats and responses
Published: (2012)


