Amazon cover image
Image from Amazon.com
Image from Coce

Cybercrime: conceptualized and codified / Richard Anderson and Kadema Carter, editors.

Contributor(s): Material type: TextTextPublisher: New York : Arcler Press, 2015Description: xi, 294 pages : illustrations ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781680941418
Subject(s): DDC classification:
  • 364.1680973 C992
LOC classification:
  • HV6773.2
Contents:
Digital forensics and cyber crime datamining -- A socio-technical approach to cyber risk management and impact assessment -- Cyber terrorism approach -- Awareness of the potential threat of cyberterrorism to the national security -- Crime prevention in ethnic areas focusing on crime prevention through environmental design -- Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon- Loeb model -- Optimized combined-clustering methods for finding replicated criminal websites -- Detection and analysis of the chameleon Wifi access point virus -- Machine learning techniques -- Crimefighter investigator: integrating synthesis and sense making for criminal network investigation -- IP traceback through (Authenticated) deterministic flow marking: an empirical evaluation -- Technology of secure file archiving in the uniformly random distributed archive scheme -- Threat assessment based on organization's information security policy.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library-Nabua Circulation Section CIR 364.1680973 C992 2015 (Browse shelf(Opens below)) 1-1 Available 026202

Includes bibliographical references and index.

Digital forensics and cyber crime datamining -- A socio-technical approach to cyber risk management and impact assessment -- Cyber terrorism approach -- Awareness of the potential threat of cyberterrorism to the national security -- Crime prevention in ethnic areas focusing on crime prevention through environmental design -- Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon- Loeb model -- Optimized combined-clustering methods for finding replicated criminal websites -- Detection and analysis of the chameleon Wifi access point virus -- Machine learning techniques -- Crimefighter investigator: integrating synthesis and sense making for criminal network investigation -- IP traceback through (Authenticated) deterministic flow marking: an empirical evaluation -- Technology of secure file archiving in the uniformly random distributed archive scheme -- Threat assessment based on organization's information security policy.

There are no comments on this title.

to post a comment.