ISBN13: | 9781032053851 |
ISBN10: | 1032053852 |
Binding: | Paperback |
No. of pages: | 454 pages |
Size: | 254x178 mm |
Weight: | 462 g |
Language: | English |
Illustrations: | 196 Illustrations, black & white; 157 Halftones, black & white; 39 Line drawings, black & white; 33 Tables, black & white |
869 |
Sociology in general, methodology, handbooks
Theory of computing, computing in general
Data management in computer systems
Privacy, data security
Safety and health aspects of computing
Criminal law
Criminology
Sociology in general, methodology, handbooks (charity campaign)
Theory of computing, computing in general (charity campaign)
Data management in computer systems (charity campaign)
Privacy, data security (charity campaign)
Safety and health aspects of computing (charity campaign)
Criminal law (charity campaign)
Criminology (charity campaign)
Cybercrime and Information Technology
GBP 64.99
Click here to subscribe.
Not in stock at Prospero.
Cybercrime and Information Technology strikes the proper balance of core concepts?laying the groundwork for students to understand both current and emerging security threats?while looking at next generation threats and technology solutions to collect digital evidence counter such threats.
Cybercrime and Information Technology: Theory and Practice?The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.
The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations?something the law is often slow to move on given the current speed in which technology advances.
Key Features:
- Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
- Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
- Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
- Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.
Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.
A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction.
1: Understanding Essential Computer Concepts 2: Cybercrime in Data-Driven and Techno-Centric Society 3: Understanding the U.S. Legal System 4: Laws, Standards, and Regulations Affecting Cybercrime 5: The Networking Environment 6: Computer Security Technology and Principles 7: Internet of Things (IoTs) 8: Mobile Devices: The Smartphone