NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Cybercrime and cyberwarfare / Igor Bernik.

By: Material type: TextSeries: Focus seriesPublisher: London, UK : ISTE Ltd ; Hoboken, NJ : John Wiley & Sons, Inc., 2014Copyright date: �2014Description: 1 online resource : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781118898604
  • 1118898605
Subject(s): Additional physical formats: Print version:: Cybercrime and cyberwarfareDDC classification:
  • 364.16 23
LOC classification:
  • HV6773 .B47 2014
Online resources:
Contents:
Cybercrime / Igor Bernik -- Cyberwarfare / Igor Bernik.
Summary: In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cybercrime / Igor Bernik -- Cyberwarfare / Igor Bernik.

Includes bibliographical references and index.

Print version record.

In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators.

John Wiley and Sons Wiley Online Library: Complete oBooks

There are no comments on this title.

to post a comment.