Stephenson et al., 2013 - Google Patents
Investigating computer-related crimeStephenson et al., 2013
- Document ID
- 17219632437395590640
- Author
- Stephenson P
- Gilbert K
- Publication year
External Links
Snippet
Cybercrime has evolved since the last edition of this book was published a decade ago. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. This volume incorporates the results of research and …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Libicki | Cyberspace in peace and war | |
| Blunden | The Rootkit arsenal: Escape and evasion in the dark corners of the system | |
| Sinrod et al. | Cyber-crimes: A practical approach to the application of federal computer crime laws | |
| Erbschloe | Trojans, worms, and spyware: a computer security professional's guide to malicious code | |
| Grimes | Hacking the hacker: Learn from the experts who take down hackers | |
| Stephenson et al. | Investigating computer-related crime | |
| Easttom et al. | Computer crime, investigation, and the law | |
| Ghosh et al. | Cybercrimes: a multidisciplinary analysis | |
| Schell et al. | Webster's new world hacker dictionary | |
| Grimes | Ransomware protection playbook | |
| Arief et al. | Technical and human issues in computer-based systems security | |
| Tiirmaa-Klaar et al. | Botnets | |
| Belous et al. | Computer viruses, malicious logic, and spyware | |
| Triantafyllou | Malware analysis | |
| Selmanaj | Adversary Emulation with MITRE ATT&CK | |
| Gavou et al. | Cyber security enhancement in Nigeria. A case study of six states in the north central (middle belt) of Nigeria | |
| Wickline | The Capabilities of Antivirus Software to Detect and Prevent Emerging Cyberthreats | |
| Meredith | Certified Ethical Hacker (CEH) v12 312-50 Exam Guide | |
| Colorossi | Cyber security | |
| Schiller | Cyber Attacks and Protection: Civilization Depends on Internet and Email | |
| Das | The Effects of Cyber Supply Chain Attacks and Mitigation Strategies | |
| Porterfield | White and black hat hackers | |
| Botwright | Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response | |
| Plotkin | Privacy, Security, and Cyberspace | |
| Wright | Business hacking: A case study of business information systems |