You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Wiley Handbook on the Psychology of Violence features a collection of original readings, from an international cast of experts, that explore all major issues relating to the psychology of violence and aggressive behaviors. Features original contributions from an interdisciplinary cast of scholars - leading experts in their fields of study Includes the latest violence research – and its implications for practice and policy Offers coverage of current issues relating to violence such as online violence and cybercriminal behavior Covers additional topics such as juvenile violence, sexual violence, family violence, and various violence issues relating to underserved and/or understudied populations
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For priv...
With over 140 countries fielding nation-state and rouge malious cyber hacking capabilities, it is critical that we are aware of threats and vulnerabilities. Adm. Michael Rogers, director of the National Security Agency warned Congress regarding cyber attacks, “It’s only a matter of the ‘when,’ not the ‘if,’ that we are going to see something dramatic.” Cyber Blackout is a warning. It is a chronicle of the cyber threats of which we find ourselves at risk every day. Our power supply is vulnerable. Our food supply. Even the basics of communication. Every facet of our national security is vulnerable to cyber threats, and we are not prepared to defend them all. Cyber Blackout explains how these threats have been building since the Cold War, how they affect us now, and how they are changing the concepts of war and peace as we know them. It is essential knowledge for anyone wishing to understand safety and security in the age of the fifth domain. www.cyberblackout.net
In seeking to evaluate the efficacy of post-9/11 homeland security expenses--which have risen by more than a trillion dollars, not including war costs--the common query has been, "Are we safer?" This, however, is the wrong question. Of course we are "safer"--the posting of a single security guard at one building's entrance enhances safety. The correct question is, "Are any gains in security worth the funds expended?" In this engaging, readable book, John Mueller and Mark Stewart apply risk and cost-benefit evaluation techniques to answer this very question. This analytical approach has been used throughout the world for decades by regulators, academics, and businesses--but, as a recent Natio...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation's cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation's mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause dam...
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration ...
As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system.With insight from field experts, this book examines:The history of social networking
"This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher.
This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest strategi