Amazon cover image
Image from Amazon.com
Image from Coce

Cybercrime: conceptualized and codified / Richard Anderson and Kadema Carter, editors.

Contributor(s): Material type: TextTextPublisher: New York : Arcler Press, 2015Description: xi, 294 pages : illustrations ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781680941418
Subject(s): DDC classification:
  • 364.1680973 C992
LOC classification:
  • HV6773.2
Contents:
Digital forensics and cyber crime datamining -- A socio-technical approach to cyber risk management and impact assessment -- Cyber terrorism approach -- Awareness of the potential threat of cyberterrorism to the national security -- Crime prevention in ethnic areas focusing on crime prevention through environmental design -- Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon- Loeb model -- Optimized combined-clustering methods for finding replicated criminal websites -- Detection and analysis of the chameleon Wifi access point virus -- Machine learning techniques -- Crimefighter investigator: integrating synthesis and sense making for criminal network investigation -- IP traceback through (Authenticated) deterministic flow marking: an empirical evaluation -- Technology of secure file archiving in the uniformly random distributed archive scheme -- Threat assessment based on organization's information security policy.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references and index.

Digital forensics and cyber crime datamining -- A socio-technical approach to cyber risk management and impact assessment -- Cyber terrorism approach -- Awareness of the potential threat of cyberterrorism to the national security -- Crime prevention in ethnic areas focusing on crime prevention through environmental design -- Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon- Loeb model -- Optimized combined-clustering methods for finding replicated criminal websites -- Detection and analysis of the chameleon Wifi access point virus -- Machine learning techniques -- Crimefighter investigator: integrating synthesis and sense making for criminal network investigation -- IP traceback through (Authenticated) deterministic flow marking: an empirical evaluation -- Technology of secure file archiving in the uniformly random distributed archive scheme -- Threat assessment based on organization's information security policy.

There are no comments on this title.

to post a comment.