New threats and countermeasures in digital crime and cyber terrorism

"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--

Saved in:
Bibliographic Details
Other Authors: Dawson, Maurice, 1982-, Omar, Marwan, 1982-
Format: eBook
Language: English
Published: Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015]
Series: Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series.
Subjects:
ISBN: 9781466683471
1466683473
9781466683457
9781466683464
1466683465
9781680157383
1680157388
1466683457
Physical Description: 1 online resource (xx, 368 pages).

Cover

Table of contents

LEADER 04926cam a2200481 i 4500
001 kn-ocn912277270
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 150305s2015 pau ob 001 0 eng
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d IDEBK  |d IGIGL  |d N$T  |d UIU  |d UMI  |d YDXCP  |d KNOVL  |d CDX  |d OCLCF  |d EBLCP  |d GGVRL  |d UBY  |d VT2  |d OL$  |d NJT  |d UKAHL  |d YWS  |d OCLCO  |d OCLCL 
020 |a 9781466683471  |q ebook 
020 |a 1466683473 
020 |z 9781466683457  |q hardcover 
020 |a 9781466683464  |q (electronic bk.) 
020 |a 1466683465  |q (electronic bk.) 
020 |a 9781680157383  |q (electronic bk.) 
020 |a 1680157388  |q (electronic bk.) 
020 |z 1466683457 
035 |a (OCoLC)912277270  |z (OCoLC)913879931 
245 0 0 |a New threats and countermeasures in digital crime and cyber terrorism /  |c Maurice Dawson, University of Missouri-St. Louis, USA, Marwan Omar, Nawroz University, Iraq. 
264 1 |a Hershey, PA :  |b Information Science Reference, An Imprint of IGI Global,  |c [2015] 
300 |a 1 online resource (xx, 368 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series 
504 |a Includes bibliographical references (pages 298-358) and index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a "This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--  |c Provided by publisher. 
505 0 |a Chapter 1. A brief review of new threats and countermeasures in digital crime and cyber terrorism / Maurice Dawson -- chapter 2. Mobile devices : the case for cyber security hardened systems / Maurice Dawson, Jorja Wright, Marwan Omar -- chapter 3. Security threats on mobile devices / Lukas Aron -- chapter 4. The human factor in mobile phising / Rasha Salah El-Din, Paul Cairns, John Clark -- chapter 5. Security issues in mobile wireless ad hoc networks : a comparative survey of methods and techniques to provide security in wireless ad hoc networks / Arif Sari -- chapter 6. Legal issues : security and privacy with mobile devices / Brain Leonard, Maurice Dawson -- chapter 7. Survey in smartphone malware analysis techniques / Moutaz Alazab, Lynn Batten -- chapter 8. Trust management in mobile ad hoc networks for QoS enhancing / Ryma Abassi -- chapter 9. Insider threats : detecting and controlling malicious insiders / Marwan Omar -- chapter 10. Authorship analysis : techniques and challenges / Athira U., Sabu M. Thampi -- chapter 11. The need for a dualist application of public and private law in Great Britain following the use of "flame trolling" during the 2011 UK riots : a review and model / Ivan Mugabi, Jonathan Bishop -- chapter 12. Native language identification (NLID) for forensic authorship analysis of weblogs / Ria Perkins -- chapter 13. The critical need for empowering leadership approaches in managing health care information security millennial employees in health care business and community organizations / Darrell Norman Burrell, Darryl Williams, Taara Bhat, Clishia Taylor -- chapter 14. Learning management systems : understand and secure your educational technology / Sharon L. Burton [and 5 others] -- chapter 15. The innovation and promise of STEM-oriented cybersecurity charter schools in urban minority communities in the United States as a tool to create a critical business workforce / Darrell Norman Burrell, Aikyna Finch, Janet Simmons, Sharon L. Burton -- chapter 16. Communication, technology, and cyber crime in Sub-Saharan Africa / Dustin Bessette, Jane A. LeClair, Randall E. Sylvertooth, Sharon L. Burton. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Computer security. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Dawson, Maurice,  |d 1982-  |1 https://id.oclc.org/worldcat/entity/E39PCjHch4RgV9hr4bhgm6htmm 
700 1 |a Omar, Marwan,  |d 1982-  |1 https://id.oclc.org/worldcat/entity/E39PCjD8bRWbc9TwfQjxpjQxwC 
776 0 8 |i Print version:  |t New threats and countermeasures in digital crime and cyber terrorism  |d Hershey, PA : Information Science Reference, An Imprint of IGI Global, [2015]  |z 9781466683457 (hardcover)  |w (DLC) 2015006753 
830 0 |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpNTCDCCT3/new-threats-and?kpromoter=marc  |y Full text