Catalog Search Results
Description
"This book provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modelling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated...
Author
Description
A cybercrime expert describes a range of abusive Internet practices, shares victims' stories, and offers advice on how to handle junk e-mail, financial scams, invasions of privacy, cyberstalking, identity theft, and other seedy practices. Includes legal resources, Web-based information sites, and useful organizations for seeking help.
Description
Criminals from around the world are using bogus e-mails and legitimate looking web sites to trick unsuspecting people. Once duped, they drain your bank accounts and wreck your finances. This dramatic film is a presentation of the United States Postal inspection Service. It tells the story of the international efforts to stop these scams and provides tips on how you can avoid being tricked by these criminals.
Description
By its very nature digital crime may present a number of specific detection and investigative challenges. The use of steganography to hide child abuse images for example, can pose the kind of technical and legislative problems inconceivable just two decades ago. The volatile nature of much digital evidence can also pose problems, particularly in terms of the actions of the 'first officer on the scene'. There are also concerns over the depth of understanding...
Author
Description
As more and more of our daily interactions have shifted online, our lives have become more comfortable - and, in many ways, more vulnerable. The persistent insecurity of Internet activity, from spam to identity theft, affects all of us every day. And if these problems are left unchecked, their financial and emotional costs will build up to the point that we begin to turn away from this vibrant and essential tool. In Creeping Failure, world cyber security...
Author
Description
"Many of us rely on web applications for so many of our daily tasks, whether at work, at home, or at play, and we access them several times a day from our laptops, tablets, phones, and other devices. We use these web applications to shop, bank, pay bills, attend online meetings, social network with friends and family, and countless other tasks. The problem is that web applications aren't as secure as we'd like to think, and most of the time the attacks...
Author
Description
"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business...
Author
Description
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers,...
Author
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request