語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybercrime and cyber warfare DUP_1
~
Bernik, Igor.
Cybercrime and cyber warfare DUP_1
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cybercrime and cyber warfare DUP_1/ Igor Bernik.
作者:
Bernik, Igor.
出版者:
Hoboken :Wiley, : 2014.,
面頁冊數:
1 online resource (177 p.)
標題:
Computer crimes. -
電子資源:
http://onlinelibrary.wiley.com/book/10.1002/9781118898604
ISBN:
9781118898956 (electronic bk.)
Cybercrime and cyber warfare DUP_1
Bernik, Igor.
Cybercrime and cyber warfare DUP_1
[electronic resource] /Igor Bernik. - Hoboken :Wiley,2014. - 1 online resource (177 p.) - FOCUS Series. - FOCUS Series..
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.
ISBN: 9781118898956 (electronic bk.)Subjects--Topical Terms:
564161
Computer crimes.
LC Class. No.: HV6773
Dewey Class. No.: 364.2
Cybercrime and cyber warfare DUP_1
LDR
:03168cam a2200313Mu 4500
001
832322
003
OCoLC
006
m o d
007
cr |||||||||||
008
160127s2014 enk o 000 0 eng d
020
$a
9781118898956 (electronic bk.)
020
$a
1118898958 (electronic bk.)
020
$a
9781118898604 (electronic bk.)
020
$a
1118898605 (electronic bk.)
020
$z
9781848216716
035
$a
(OCoLC)871224260
035
$a
ocn871224260
040
$a
EBLCP
$b
eng
$c
EBLCP
$d
OCLCQ
$d
IDEBK
050
4
$a
HV6773
082
0 4
$a
364.2
$2
23
100
1
$a
Bernik, Igor.
$3
1058897
245
1 0
$a
Cybercrime and cyber warfare DUP_1
$h
[electronic resource] /
$c
Igor Bernik.
260
$a
Hoboken :
$b
Wiley,
$c
2014.
300
$a
1 online resource (177 p.)
490
1
$a
FOCUS Series
505
0
$a
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
505
8
$a
1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights1.7.3. Digital Millennium Copyright Act; 1.7.4. United Nations Charter; 1.8. Cybercrime conclusion; Chapter 2. Cyberwarfare; 2.1. Information and cyberspace; 2.1.1. Cyberspace and ICT; 2.1.2. Information power and information conflict; 2.2. Understanding cyberwarfare; 2.2.1. The nature of cyberwarfare; 2.2.2. Types and techniques of cyberwarfare; 2.3. Perpetrators and victims of cyberwarfare; 2.4. Committing cyberwarfare; 2.4.1. Espionage; 2.4.2. Active warfare; 2.4.3. Information operations; 2.4.4. Propaganda activity.
505
8
$a
2.5. Organizations and cyberwarfare2.5.1. Industrial espionage; 2.5.2. Politically and ideologically motivated groups -- perpetrators of cyberwarfare; 2.6. The role of countries in cyberwarfare; 2.6.1. The United States; 2.6.2. China; 2.6.3. Russia; 2.6.4. India; 2.6.5. Iran; 2.6.6. Israel; 2.6.7. North Korea; 2.7. Efforts against cyberwarfare: international and national legislation; 2.8. Defense against cyberwarfare; 2.9. Cyberwarfare conclusion; Conclusion; Bibliography; Index.
520
$a
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.
588
$a
Description based on print version record.
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Information warfare.
$3
557120
830
0
$a
FOCUS Series.
$3
1058710
856
4 0
$u
http://onlinelibrary.wiley.com/book/10.1002/9781118898604
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入