語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybercrime and cyber warfare
~
Bernik, Igor.
FindBook
Google Book
Amazon
博客來
Cybercrime and cyber warfare
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybercrime and cyber warfare/ Igor Bernik.
作者:
Bernik, Igor.
出版者:
Hoboken :Wiley, : 2014.,
面頁冊數:
1 online resource (177 p.)
內容註:
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
內容註:
1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights1.7.3. Digital Millennium Copyright Act; 1.7.4. United Nations Charter; 1.8. Cybercrime conclusion; Chapter 2. Cyberwarfare; 2.1. Information and cyberspace; 2.1.1. Cyberspace and ICT; 2.1.2. Information power and information conflict; 2.2. Understanding cyberwarfare; 2.2.1. The nature of cyberwarfare; 2.2.2. Types and techniques of cyberwarfare; 2.3. Perpetrators and victims of cyberwarfare; 2.4. Committing cyberwarfare; 2.4.1. Espionage; 2.4.2. Active warfare; 2.4.3. Information operations; 2.4.4. Propaganda activity.
內容註:
2.5. Organizations and cyberwarfare2.5.1. Industrial espionage; 2.5.2. Politically and ideologically motivated groups -- perpetrators of cyberwarfare; 2.6. The role of countries in cyberwarfare; 2.6.1. The United States; 2.6.2. China; 2.6.3. Russia; 2.6.4. India; 2.6.5. Iran; 2.6.6. Israel; 2.6.7. North Korea; 2.7. Efforts against cyberwarfare: international and national legislation; 2.8. Defense against cyberwarfare; 2.9. Cyberwarfare conclusion; Conclusion; Bibliography; Index.
標題:
Computer crimes. -
電子資源:
http://onlinelibrary.wiley.com/book/10.1002/9781118898604
ISBN:
9781118898956 (electronic bk.)
Cybercrime and cyber warfare
Bernik, Igor.
Cybercrime and cyber warfare
[electronic resource] /Igor Bernik. - Hoboken :Wiley,2014. - 1 online resource (177 p.) - FOCUS Series. - FOCUS Series..
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.
ISBN: 9781118898956 (electronic bk.)Subjects--Topical Terms:
583792
Computer crimes.
LC Class. No.: HV6773
Dewey Class. No.: 364.2
Cybercrime and cyber warfare
LDR
:03162cmm a2200313Mu 4500
001
2002813
003
OCoLC
006
m o d
007
cr |||||||||||
008
151223s2014 enk o 000 0 eng d
020
$a
9781118898956 (electronic bk.)
020
$a
1118898958 (electronic bk.)
020
$a
9781118898604 (electronic bk.)
020
$a
1118898605 (electronic bk.)
020
$z
9781848216716
035
$a
(OCoLC)871224260
035
$a
ocn871224260
040
$a
EBLCP
$b
eng
$c
EBLCP
$d
OCLCQ
$d
IDEBK
050
4
$a
HV6773
082
0 4
$a
364.2
$2
23
100
1
$a
Bernik, Igor.
$3
2147550
245
1 0
$a
Cybercrime and cyber warfare
$h
[electronic resource] /
$c
Igor Bernik.
260
$a
Hoboken :
$b
Wiley,
$c
2014.
300
$a
1 online resource (177 p.)
490
1
$a
FOCUS Series
505
0
$a
Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime.
505
8
$a
1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights1.7.3. Digital Millennium Copyright Act; 1.7.4. United Nations Charter; 1.8. Cybercrime conclusion; Chapter 2. Cyberwarfare; 2.1. Information and cyberspace; 2.1.1. Cyberspace and ICT; 2.1.2. Information power and information conflict; 2.2. Understanding cyberwarfare; 2.2.1. The nature of cyberwarfare; 2.2.2. Types and techniques of cyberwarfare; 2.3. Perpetrators and victims of cyberwarfare; 2.4. Committing cyberwarfare; 2.4.1. Espionage; 2.4.2. Active warfare; 2.4.3. Information operations; 2.4.4. Propaganda activity.
505
8
$a
2.5. Organizations and cyberwarfare2.5.1. Industrial espionage; 2.5.2. Politically and ideologically motivated groups -- perpetrators of cyberwarfare; 2.6. The role of countries in cyberwarfare; 2.6.1. The United States; 2.6.2. China; 2.6.3. Russia; 2.6.4. India; 2.6.5. Iran; 2.6.6. Israel; 2.6.7. North Korea; 2.7. Efforts against cyberwarfare: international and national legislation; 2.8. Defense against cyberwarfare; 2.9. Cyberwarfare conclusion; Conclusion; Bibliography; Index.
520
$a
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.
588
$a
Description based on print version record.
650
0
$a
Computer crimes.
$3
583792
650
0
$a
Information warfare.
$3
606619
830
0
$a
FOCUS Series.
$3
2147372
856
4 0
$u
http://onlinelibrary.wiley.com/book/10.1002/9781118898604
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9270723
電子資源
11.線上閱覽_V
電子書
EB HV6773
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入