PICK&READ
Bonjour !
Connectez-vous pour afficher vos livres, identifier ceux en cours de lecture ou déjà lus
Pas encore de compte ?
This SpringerBrief contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention to the development of cybersecurity in Morocco and to ensure national security in the context of the current and...
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement,...
This book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend computational social...
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous,...
This Brief presents the overarching framework in which each nation is developing its own cyber-security policy, and the unique position adopted by France. Modern informational crises have penetrated most societal arenas, from healthcare, politics, economics to the...
Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and...
Securing privacy in the current environment is one of the great challenges of today’s democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon...
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken. Although there is still tension between those who feel strongly about the subject, a...
Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year....
Within the last decade, the Internet has developed as a phenomenon encompassing social, cultural, economic and legal facets. It has become common practice to use the Internet for both the retrieval and provision of information, with the result that the Internet has...
En poursuivant votre navigation, vous acceptez l'utilisation de cookies qui permettront notamment de vous offrir contenus, services, et publicités liés à vos centres d'intérêt.