New Threats and Countermeasures in Digital Crime and Cyber Terrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Indexed In: SCOPUS View 1 More Indices
Release Date: April, 2015|Copyright: © 2015 |Pages: 368
DOI: 10.4018/978-1-4666-8345-7
ISBN13: 9781466683457|ISBN10: 1466683457|EISBN13: 9781466683464
Hardcover:
Available
$200.00
TOTAL SAVINGS: $200.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$200.00
TOTAL SAVINGS: $200.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$200.00
TOTAL SAVINGS: $200.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$200.00
TOTAL SAVINGS: $200.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users.

New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Health Information Security
  • Learning Management Systems
  • Legal Implications
  • Mobile Device Privacy
  • Mobile Phishing
  • Security Issues
  • Smartphone Malware Analysis
  • Wireless Networks
Reviews & Statements

Exploring various aspects of cyber terrorism, and cyber crime in today's society, scholars of computer science and information technology specializing in computer security provide insights into the negative uses of technology and review associated vulnerabilities and mitigation. Among their topics are the case for cyber-security-hardened mobile systems, a comparative survey of methods and techniques to provide security in wireless ad hoc networks, managing trust to enhance quality of service in mobile ad hoc networks, identifying the author's native language for the forensic analysis of weblog authorship, and the innovation and promise of STEM (science, technology, engineering, mathematics)-oriented cybersecurity charter schools in urban minority communities in the US as a tool to create a critical business workforce.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Maurice Dawson serves as an Assistant Professor of Information Systems at University of Missouri-St. Louis, Visiting Assistant Professor (Honorary) of Industrial and Systems Engineering at The University of Tennessee Space Institute, and Fulbright. Dawson is recognized as an Information Assurance System Architect and Engineer by the U.S. Department of Defense. Research focus area is cyber security, systems security engineering, open source software (OSS), mobile security, and engineering management.
Marwan Omar serves as a full time faculty member of computer science and IT at Nawroz University, Duhok, Iraq. Omar is recognized for his information security expertise and knowledge and holds a security + certification from Comptia. Research interests are: cyber security, mobile security, open source software, and cloud computing.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.