The Locator -- [(subject = "Computer crimes")]

1202 records matched your query       


Record 2 | Previous Record | Long Display | Next Record
03347aam a2200361 i 4500
001 E18CEF94141211EF8F56A7732FECA4DB
003 SILO
005 20240517010047
008 230522t20242024flu      b    001 0 eng  
010    $a 2023023858
020    $a 1032524510
020    $a 9781032524511
020    $a 1032524499
020    $a 9781032524498
035    $a (OCoLC)1401057001
040    $a DLC $b eng $e rda $c DLC $d OCLCO $d YDX $d SILO
042    $a pcc
050 00 $a HV6773 $b .W37 2024
100 1  $a Watters, Paul A., $e author.
245 10 $a Cybercrime and cybersecurity / $c Paul A. Watters.
250    $a First edition.
264  1 $a Boca Raton : $b CRC Press, Taylor & Francis Group, $c 2024.
300    $a xv, 165 pages ; $c 24 cm
504    $a Includes bibliographical references and index.
520    $a "The field of cybersecurity and cybercrime is a critical and rapidly evolving area of study. As our society becomes more and more reliant on technology, the risks of cybercrime increase. This book provides a comprehensive introduction to the field, covering both cybercrime and cybersecurity. The book starts by providing an overview of common threats and the risk management view of cybercrime. It explores the different types of threats, such as hacking, malware, phishing, and social engineering, and the various ways in which they can impact individuals, businesses, and society at large. It also introduces the concept of risk management and the different approaches that can be used to manage cyber risks, such as risk avoidance, mitigation, transfer, and acceptance. From there, the book delves into the three key areas of cybersecurity: people, process, and technology. It explores the role of people in cybersecurity, including staffing, psychological profiling, role sensitivity, awareness, training, and education. It also examines the importance of process, including strategy and governance, policy, configuration management, and physical security. Finally, the book explores the critical role of technology, including system security, identification and authentication, authorization and access control, and cryptography. The book is designed to be accessible to a wide range of readers, from first-year students studying cybercrime and cybersecurity for the first time to seasoned professionals who need to better understand the purpose of cybersecurity programs and controls. It is written in a clear and concise manner, with each chapter building on the previous one to provide a comprehensive overview of the field. Overall, this book is an essential resource for anyone interested in the field of cybersecurity and cybercrime. It provides a critical introduction to the key concepts, theories, and practices in the field, and is sure to be a valuable reference for years to come"-- $c Provided by publisher.
650  0 $a Computer crimes.
650  0 $a Computer security.
650  6 $a Criminalite informatique. $0 (CaQQLa)201-0056438
650  6 $a Securite informatique. $0 (CaQQLa)201-0061152
776 08 $i Online version: $a Watters, Paul A. $t Cybercrime and cybersecurity. $b First edition $d Boca Raton : CRC Press, Taylor & Francis Group, 2024 $z 9781003406730 $w (DLC)  2023023859
941    $a 1
952    $l OVUX522 $d 20240517012603.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=E18CEF94141211EF8F56A7732FECA4DB

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.