Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybercrime and cyber warfare
~
Bernik, Igor.
Linked to FindBook
Google Book
Amazon
博客來
Cybercrime and cyber warfare
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybercrime and cyber warfare/ Igor Bernik.
Author:
Bernik, Igor.
Published:
Hoboken :Wiley, : 2014.,
Description:
1 online resource (177 p.)
[NT 15003449]:
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
[NT 15003449]:
1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights1.7.3. Digital Millennium Copyright Act; 1.7.4. United Nations Charter; 1.8. Cybercrime conclusion; Chapter 2. Cyberwarfare; 2.1. Information and cyberspace; 2.1.1. Cyberspace and ICT; 2.1.2. Information power and information conflict; 2.2. Understanding cyberwarfare; 2.2.1. The nature of cyberwarfare; 2.2.2. Types and techniques of cyberwarfare; 2.3. Perpetrators and victims of cyberwarfare; 2.4. Committing cyberwarfare; 2.4.1. Espionage; 2.4.2. Active warfare; 2.4.3. Information operations; 2.4.4. Propaganda activity.
[NT 15003449]:
2.5. Organizations and cyberwarfare2.5.1. Industrial espionage; 2.5.2. Politically and ideologically motivated groups -- perpetrators of cyberwarfare; 2.6. The role of countries in cyberwarfare; 2.6.1. The United States; 2.6.2. China; 2.6.3. Russia; 2.6.4. India; 2.6.5. Iran; 2.6.6. Israel; 2.6.7. North Korea; 2.7. Efforts against cyberwarfare: international and national legislation; 2.8. Defense against cyberwarfare; 2.9. Cyberwarfare conclusion; Conclusion; Bibliography; Index.
Subject:
Computer crimes. -
Online resource:
http://onlinelibrary.wiley.com/book/10.1002/9781118898604
ISBN:
9781118898956 (electronic bk.)
Cybercrime and cyber warfare
Bernik, Igor.
Cybercrime and cyber warfare
[electronic resource] /Igor Bernik. - Hoboken :Wiley,2014. - 1 online resource (177 p.) - FOCUS Series. - FOCUS Series..
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.
ISBN: 9781118898956 (electronic bk.)Subjects--Topical Terms:
583792
Computer crimes.
LC Class. No.: HV6773
Dewey Class. No.: 364.2
Cybercrime and cyber warfare
LDR
:03162cmm a2200313Mu 4500
001
2002813
003
OCoLC
006
m o d
007
cr |||||||||||
008
151223s2014 enk o 000 0 eng d
020
$a
9781118898956 (electronic bk.)
020
$a
1118898958 (electronic bk.)
020
$a
9781118898604 (electronic bk.)
020
$a
1118898605 (electronic bk.)
020
$z
9781848216716
035
$a
(OCoLC)871224260
035
$a
ocn871224260
040
$a
EBLCP
$b
eng
$c
EBLCP
$d
OCLCQ
$d
IDEBK
050
4
$a
HV6773
082
0 4
$a
364.2
$2
23
100
1
$a
Bernik, Igor.
$3
2147550
245
1 0
$a
Cybercrime and cyber warfare
$h
[electronic resource] /
$c
Igor Bernik.
260
$a
Hoboken :
$b
Wiley,
$c
2014.
300
$a
1 online resource (177 p.)
490
1
$a
FOCUS Series
505
0
$a
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
505
8
$a
1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights1.7.3. Digital Millennium Copyright Act; 1.7.4. United Nations Charter; 1.8. Cybercrime conclusion; Chapter 2. Cyberwarfare; 2.1. Information and cyberspace; 2.1.1. Cyberspace and ICT; 2.1.2. Information power and information conflict; 2.2. Understanding cyberwarfare; 2.2.1. The nature of cyberwarfare; 2.2.2. Types and techniques of cyberwarfare; 2.3. Perpetrators and victims of cyberwarfare; 2.4. Committing cyberwarfare; 2.4.1. Espionage; 2.4.2. Active warfare; 2.4.3. Information operations; 2.4.4. Propaganda activity.
505
8
$a
2.5. Organizations and cyberwarfare2.5.1. Industrial espionage; 2.5.2. Politically and ideologically motivated groups -- perpetrators of cyberwarfare; 2.6. The role of countries in cyberwarfare; 2.6.1. The United States; 2.6.2. China; 2.6.3. Russia; 2.6.4. India; 2.6.5. Iran; 2.6.6. Israel; 2.6.7. North Korea; 2.7. Efforts against cyberwarfare: international and national legislation; 2.8. Defense against cyberwarfare; 2.9. Cyberwarfare conclusion; Conclusion; Bibliography; Index.
520
$a
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.
588
$a
Description based on print version record.
650
0
$a
Computer crimes.
$3
583792
650
0
$a
Information warfare.
$3
606619
830
0
$a
FOCUS Series.
$3
2147372
856
4 0
$u
http://onlinelibrary.wiley.com/book/10.1002/9781118898604
based on 0 review(s)
Location:
全部
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9270723
電子資源
11.線上閱覽_V
電子書
EB HV6773
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login