Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

S. Geetha (VIT Chennai, India) and Asnath Victy Phamila (VIT Chennai, India)
Release Date: February, 2019|Copyright: © 2019 |Pages: 334|DOI: 10.4018/978-1-5225-8241-0
ISBN13: 9781522582410|ISBN10: 152258241X|EISBN13: 9781522582427|ISBN13 Softcover: 9781522583202
Hardcover:
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Softcover:
Available
$170.00
TOTAL SAVINGS: $170.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*

Description

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security.

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Authentication
  • Civil Litigation
  • Cloud Forensics
  • Criminal Psychology
  • Criminology
  • Cyber Warfare
  • Digital Evidence
  • Digital Forensics
  • Encryptions
  • Incident Response
  • Law Enforcement
  • Machine Learning
  • Mobile Forensics
  • National Security

Table of Contents and List of Contributors

Search this Book:
Reset