[go: up one dir, main page]

Stephenson et al., 2013 - Google Patents

Investigating computer-related crime

Stephenson et al., 2013

Document ID
17219632437395590640
Author
Stephenson P
Gilbert K
Publication year

External Links

Snippet

Cybercrime has evolved since the last edition of this book was published a decade ago. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. This volume incorporates the results of research and …
Continue reading at books.google.com (other versions)

Similar Documents

Publication Publication Date Title
Libicki Cyberspace in peace and war
Blunden The Rootkit arsenal: Escape and evasion in the dark corners of the system
Sinrod et al. Cyber-crimes: A practical approach to the application of federal computer crime laws
Erbschloe Trojans, worms, and spyware: a computer security professional's guide to malicious code
Grimes Hacking the hacker: Learn from the experts who take down hackers
Stephenson et al. Investigating computer-related crime
Easttom et al. Computer crime, investigation, and the law
Ghosh et al. Cybercrimes: a multidisciplinary analysis
Schell et al. Webster's new world hacker dictionary
Grimes Ransomware protection playbook
Arief et al. Technical and human issues in computer-based systems security
Tiirmaa-Klaar et al. Botnets
Belous et al. Computer viruses, malicious logic, and spyware
Triantafyllou Malware analysis
Selmanaj Adversary Emulation with MITRE ATT&CK
Gavou et al. Cyber security enhancement in Nigeria. A case study of six states in the north central (middle belt) of Nigeria
Wickline The Capabilities of Antivirus Software to Detect and Prevent Emerging Cyberthreats
Meredith Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
Colorossi Cyber security
Schiller Cyber Attacks and Protection: Civilization Depends on Internet and Email
Das The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
Porterfield White and black hat hackers
Botwright Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response
Plotkin Privacy, Security, and Cyberspace
Wright Business hacking: A case study of business information systems