Cybercrime and cyber warfare /
"In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
London, UK : Hoboken, NJ :
ISTE ; Wiley,
2014.
|
Series: | Focus nanoscience and nanotechnology series.
|
Subjects: | |
Online Access: | Full text (Emerson users only) Full text (Emmanuel users only) Full text (NECO users only) Full text (MCPHS users only) Full text (Wentworth users only) Full text (Wentworth users only) |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | 0d007005-a19c-465a-b8f7-4c8efd43ca66 | ||
005 | 20240828000000.0 | ||
008 | 140404s2014 enk ob 001 0 eng d | ||
019 | |a 871224260 |a 875867363 |a 961625420 |a 962639609 | ||
020 | |a 1118898958 |q (electronic bk.) | ||
020 | |a 9781118898956 |q (electronic bk.) | ||
020 | |a 9781118899090 |q (electronic bk.) | ||
020 | |a 1118899091 |q (electronic bk.) | ||
020 | |a 9781118898604 |q (electronic bk.) | ||
020 | |a 1118898605 |q (electronic bk.) | ||
020 | |z 1848216718 | ||
020 | |z 9781848216716 | ||
020 | |z 9781306473347 | ||
020 | |z 1306473349 | ||
024 | 7 | |a 10.1002/9781118898604 |2 doi | |
035 | |a (OCoLC)875630393 |z (OCoLC)871224260 |z (OCoLC)875867363 |z (OCoLC)961625420 |z (OCoLC)962639609 | ||
035 | |a (OCoLC)ocn875630393 | ||
037 | |a 578585 |b MIL | ||
037 | |a 6B87D0B1-EDA3-423F-A3F4-D3F290F0D318 |b OverDrive, Inc. |n http://www.overdrive.com | ||
037 | |a 9820788 |b IEEE | ||
040 | |a CDX |b eng |e rda |e pn |c CDX |d OCLCQ |d CUS |d TEFOD |d RECBK |d OCLCO |d OCLCA |d OCLCQ |d STF |d COO |d TEFOD |d OCLCQ |d EBLCP |d IDEBK |d E7B |d AZU |d DEBSZ |d OCLCF |d OCLCO |d TEFOD |d OCLCO |d CNNOR |d MOR |d PIFAG |d ZCU |d LIV |d MERUC |d OCLCQ |d OCLCA |d U3W |d OCL |d ICG |d VT2 |d OCLCQ |d G3B |d TKN |d DKC |d YDX |d OCLCO |d OCLCA |d OCLCQ |d UKAHL |d OCLCQ |d RDF |d OCLCQ |d OCLCA |d OCLCO |d IEEEE |d OCL |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
050 | 4 | |a HV6773 | |
082 | 0 | 4 | |a 364.2 |b 23 |
100 | 1 | |a Bernik, Igor, |e author. | |
245 | 1 | 0 | |a Cybercrime and cyber warfare / |c Igor Bernik. |
264 | 1 | |a London, UK : |b ISTE ; |a Hoboken, NJ : |b Wiley, |c 2014. | |
300 | |a 1 online resource (x, 176 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Focus series | |
504 | |a Includes bibliographical references (pages 145-161) and index. | ||
505 | 0 | |a Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime. | |
505 | 8 | |a 1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights1.7.3. Digital Millennium Copyright Act; 1.7.4. United Nations Charter; 1.8. Cybercrime conclusion; Chapter 2. Cyberwarfare; 2.1. Information and cyberspace; 2.1.1. Cyberspace and ICT; 2.1.2. Information power and information conflict; 2.2. Understanding cyberwarfare; 2.2.1. The nature of cyberwarfare; 2.2.2. Types and techniques of cyberwarfare; 2.3. Perpetrators and victims of cyberwarfare; 2.4. Committing cyberwarfare; 2.4.1. Espionage; 2.4.2. Active warfare; 2.4.3. Information operations; 2.4.4. Propaganda activity. | |
505 | 8 | |a 2.5. Organizations and cyberwarfare2.5.1. Industrial espionage; 2.5.2. Politically and ideologically motivated groups -- perpetrators of cyberwarfare; 2.6. The role of countries in cyberwarfare; 2.6.1. The United States; 2.6.2. China; 2.6.3. Russia; 2.6.4. India; 2.6.5. Iran; 2.6.6. Israel; 2.6.7. North Korea; 2.7. Efforts against cyberwarfare: international and national legislation; 2.8. Defense against cyberwarfare; 2.9. Cyberwarfare conclusion; Conclusion; Bibliography; Index. | |
520 | |a "In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace."-- |c Unedited summary from book. | ||
588 | 0 | |a Online resource; title from PDF title page (Wiley, viewed April 3, 2014). | |
590 | |a ProQuest Ebook Central |b Ebook Central College Complete | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer crimes. | |
650 | 0 | |a Cyberspace |x Security measures. | |
650 | 0 | |a Information warfare. | |
650 | 0 | |a Security systems. | |
650 | 0 | |a Threats |x Safety measures. | |
650 | 7 | |a security systems. |2 aat | |
758 | |i has work: |a Cybercrime and cyber warfare (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFyMttDPgCVRCpVp9PtfHK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Bernik, Igor. |t Cybercrime and cyber warfare. |d London : Wiley-ISTE 2013 |z 1848216718 |w (OCoLC)875131032 |
830 | 0 | |a Focus nanoscience and nanotechnology series. | |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/emerson/detail.action?docID=1638160 |z Full text (Emerson users only) |t 0 |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/emmanuel/detail.action?docID=1638160 |z Full text (Emmanuel users only) |t 0 |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/neco/detail.action?docID=1638160 |z Full text (NECO users only) |t 0 |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/mcphs/detail.action?docID=1638160 |z Full text (MCPHS users only) |t 0 |
856 | 4 | 0 | |t 0 |u https://ezproxywit.flo.org/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781118898604 |y Full text (Wentworth users only) |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1638160 |z Full text (Wentworth users only) |t 0 |
999 | 1 | 0 | |i 0d007005-a19c-465a-b8f7-4c8efd43ca66 |l in00000207256 |s US-MBE |m cybercrime_and_cyber_warfare_______________________________________________2014_______iste_a________________________________________bernik__igor_______________________e |
999 | 1 | 0 | |i 0d007005-a19c-465a-b8f7-4c8efd43ca66 |l in00000276768 |s US-MBEMM |m cybercrime_and_cyber_warfare_______________________________________________2014_______iste_a________________________________________bernik__igor_______________________e |
999 | 1 | 0 | |i 0d007005-a19c-465a-b8f7-4c8efd43ca66 |l in00000002808 |s US-MBNECO |m cybercrime_and_cyber_warfare_______________________________________________2014_______iste_a________________________________________bernik__igor_______________________e |
999 | 1 | 0 | |i 0d007005-a19c-465a-b8f7-4c8efd43ca66 |l in00000289173 |s US-MBP |m cybercrime_and_cyber_warfare_______________________________________________2014_______iste_a________________________________________bernik__igor_______________________e |
999 | 1 | 0 | |i 0d007005-a19c-465a-b8f7-4c8efd43ca66 |l w2010346 |s US-MBWI |m cybercrime_and_cyber_warfare_______________________________________________2014_______iste_a________________________________________bernik__igor_______________________e |
999 | 1 | 0 | |i 0d007005-a19c-465a-b8f7-4c8efd43ca66 |l in00000285748 |s US-MBWI |m cybercrime_and_cyber_warfare_______________________________________________2014_______iste_a________________________________________bernik__igor_______________________e |
999 | 1 | 1 | |l in00000207256 |s ISIL:US-MBE |i Emerson |t BKS |a EBooks |c ProQuest |d Other scheme |x E-Resource |p UNLOANABLE |
999 | 1 | 1 | |l in00000276768 |s ISIL:US-MBEMM |i Emmanuel |t BKS |a Online |c ProQuest |d Other scheme |p UNLOANABLE |
999 | 1 | 1 | |l in00000002808 |s ISIL:US-MBNECO |i NECO |t BKS |a eBooks |c ProQuest |d Other scheme |p UNLOANABLE |
999 | 1 | 1 | |l in00000289173 |s ISIL:US-MBP |i MCPHS |t BKS |a E-Collections |c ProQuest |d Other scheme |p UNLOANABLE |
999 | 1 | 1 | |l w2010346 |s ISIL:US-MBWI |i Wentworth |t BKS |a Ebooks |c Wiley |d Other scheme |p UNLOANABLE |
999 | 1 | 1 | |l in00000285748 |s ISIL:US-MBWI |i Wentworth |t BKS |a Ebooks |c ProQuest |d Other scheme |p UNLOANABLE |