Vi bøger
Levering: 1 - 2 hverdage

Datakriminalitet, internetkriminalitet

Her finder du spændende bøger om Datakriminalitet, internetkriminalitet. Nedenfor er et flot udvalg af over 90 bøger om emnet. Det er også her du finder emner som Hacking.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Søren Baastrup & Johnny Robin Jørgensen
    195,95 - 227,95 kr.

    PÅ GRÆNSEN er en øjenåbnende, forargende og underholdende historie om et utraditionelt politiliv bag kulisserne i KØBENHAVNS LUFTHAVN. Som veteran fra den navnkundige Uropatrulje mavelandede JOHNNY ROBIN JØRGENSEN i lufthavnen i 1992, på nederste hylde i politiets hierarki. Men han fandt ud af, at man kan gøre den største forskel, der hvor ingen andre gider at være. Han blev en del af den SPECIALENHED I POLITIET, som forvaltede den stramme danske udlændingepolitik i et pivåbent EU. Han blev ekspert i at profilere illegale immigranter og MENNESKESMUGLERE. Han spottede falske pas og papirer. Og fik dyb indsigt i de ofte groteske forhold bag de tonede ruder på DANMARKS MÅSKE VIGTIGSTE POLITISTATION. Bogen er skrevet i samarbejde med journalist Søren Baastrup, der står bag flere true crime-bestsellere.

  • af Laurent Richard & Sandrine Rigaud
    127,95 - 195,95 kr.

  • - PC- og onlinesikkerhed
    af Lars Laursen
    197,95 - 268,95 kr.

    PC- og onlinesikkerhed er i stigende grad blevet vigtigt for pc-brugere over hele verden. Der er en lang række trusler, der kan ramme dig, når du er på Internettet. Du har måske hørt om en række former for skadelige programmer, der under ét kaldes for malware, og som kan ramme den intetanende pc- og smartphonebruger. Der kan være tale om: Virus – programmer, der smitter og inficerer ens egen og andre pc’er på netværket. Trojanske heste – programmer, som har en skadelig ladning af malware med sig. Spyware – programmer, der udspionerer din gøren og laden på pc’en, og som f.eks. sender dine indtastede kreditkortoplysninger videre til en bagmand. Keyloggere – programmer der registrerer alt, hvad du taster på tastaturet, og sender det til en bagmand. Zombier – din pc kan blive overtaget af en bagmand og skjult indlemmet i et netværk (botnet) af andre zombie-computere, som sammen angriber hjemmesider eller sender store mængder spam ud i verden. Adware – programmer, der viser reklamer på din pc og på hjemmesider, og som er meget irriterende. Ransomware – du kan blive afkrævet en løsesum for at slippe din pc fri for malware, der krypterer dine filer, så du ikke kan læse dem igen. Du lærer om: Identitetstyveri – pas på ikke at få stjålet dine personlige oplysninger, som kriminelle så kan misbruge. Fupbutikker – lær at spotte falske netbutikker, som sælger kopivarer under dække af at være ægte eller sælger dine kreditkortoplysninger. Digitalt selvforsvar – hvordan sikrer du din anonymitet på nettet? Lær om browseranonymitet og andre værktøjer såsom TOR-netværket, der øger din grad af anonymitet på både pc og smartphone. Dine børns onlinesikkerhed – Windows stiller en række værktøjer til rådighed for forældres styring af deres børns brug af pc’en. Læs også hvordan du sikrer dine børns smartphones og tablets. Adgangskoder – hvordan gør man dem sikre? Hvor mange skal man have? Lær også om farerne ved uopfordret tilsendte e-mails: At der kan følge malware med i en vedhæftet fil (bilag) i en e-mail. At du har vundet millioner i et lotteri, uden at du har deltaget i det. At en person har arvet en millionsum, men har brug for en udlænding (dig) til at overføre pengene til sig – mod betaling af en procentdel af arven. At blive mellemmand (muldyr) med en bankkonto til at modtage penge og sende dem videre for et udenlandsk firma – mod at beholde nogle få procent af beløbet. At dit NemID er midlertidigt suspenderet – indtil du oplyser dit NemID-log-ind og uploader et billede af dit nøglekort. Læs om farerne for og hvordan du sikrer dit NemID og netbank. At din PayPal-konto er blevet kompromitteret, og at du derfor skal bekræfte dit log-ind. At du skal sende din Verified-by-Visa-SMS-kode videre per SMS til en bagmand. At en person, du har fået kontakt med via en dating-hjemmeside, akut har brug for mange penge. Heldigvis kan man med oplysning og uddannelse og de rette sikkerhedsprogrammer gardere sig mod disse farer og færdes ret sikkert på nettet alligevel. Denne bog med mange illustrationer beskriver disse farer indgående og oplyser om, hvilke faresignaler du skal være agtpågivende overfor. Der er sammenligninger af antivirusprogrammer med firewall, så du kan se hvilke programmer, der er gode lige nu. Hvis du skulle være blevet ramt af malware, er der også beskrevet nogle fremgangsmåder, hvormed du kan fjerne den igen. Desuden lærer du om sikkerhedskopiering, så du ikke behøver at miste dine filer, hvis du rammes af ransomware.

  • af Peter Blume
    744,95 kr.

    Beskyttelse af personoplysninger har fået stadig større betydning i nutidens samfund, men det er kontroversielt hvor omfattende og intensiv beskyttelsen bør være. I bogen beskrives de almindelige hensyn og værdier, der har betydning ved udformningen og anvendelsen af den retlige regulering.Fremstillingen er baseret på den nye persondataret, som følger af persondataforordningen og databeskyttelsesloven. Den er derfor væsentligt revideret i forhold til forrige udgave af bogen.I bogens kapitler behandles:Personen og det privateRetskilder og aktørerDet teknologiske og retlige miljøPersondatarettens grundtrækRettighederDen offentlige sektorDen private sektorInternationale dataoverførslerInternettetPrivatliv v. informationsfrihedOvervågningDatabeskyttelsens fremtid Peter Blume er professor ved Det Juridiske Fakultet, Københavns Universitet.

  • af Alan F. Westin
    267,95 kr.

  • af Michael Chertoff
    172,95 - 277,95 kr.

    A powerful argument for new laws and policies regarding cyber-security, from the former Secretary of Homeland Security

  • af Felix I. Lessambo
    1.266,95 kr.

    Despite massive investments in mitigation capabilities, financial crime remains a trillion-dollar global issue with impacts that extend well beyond the financial services industry. Worldwide, there are between $800 billion and $2 trillion laundered annually with the United States making up at least $300 billion of that figure. Although it is not possible to measure money laundering in the same way as legitimate economic activity, the scale of the problem is considered enormous. The cybersecurity landscape is always shifting, with threats becoming more sophisticated all the time. Managing risks in the banking and financial sectors requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Cybercrime is a global problem, which requires a coordinated international response. This book outlines the regulatory requirements that come out of cyber laws and showcases the comparison in dealing with AML/CFT and cybersecurityamong the G-20, which will be of interest to scholars, students and policymakers within these fields.

  • af Layla May
    1.261,95 kr.

    This book provides an analysis of social media and women¿s resistance in Iran with relevance to similar polities. The author examines how Iranian women continue to fight against the regime¿s gender discriminatory laws and protest the government in public squares and in virtual spaces. The book presents a critical approach to technology¿s role in politics and society and an in-depth analysis of authoritarianism and its relationship to social media harms and state violence. With a particular focus on images, hashtags, and other digital content, it calls for a rethinking of the concepts of crime, culture, and control in the technosocial world. The author draws on conceptual contributions from the fields of criminology, philosophy, psychology, technology and media studies.

  • af Reza Montasari
    1.390,95 kr.

    This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security.

  • af Hamid Jahankhani
    1.428,95 - 1.661,95 kr.

  • af Christian Kaunert
    1.207,95 - 1.252,95 kr.

  • af Reza Montasari
    1.733,95 - 1.787,95 kr.

  • af Alina Hazel
    208,95 kr.

    In the computerized age, QR codes have become pervasive, consistently coordinated into our regular routines. From item marks to café menus, these high contrast squares guarantee effectiveness and accommodation. Notwithstanding, underneath the outer layer of this innovative simplicity lies a developing danger - QR code cheats. "Examining Risk" digs into the many-sided snare of misdirection turned by noxious entertainers taking advantage of the clueless public through controlled QR codes. The account starts by disentangling the harmless beginnings of QR codes, intended for proficient information stockpiling and recovery. As these codes acquired prevalence, so did their abuse. The book explores through the advancing scene of cybercrime, where hoodlums exploit the trust set in QR codes for accursed purposes. Alina Hazel, the focal figure in this investigation, arises as a casualty turned-advocate, her own experience enhancing the direness to uncover the underside of QR code cheats. The creator carefully takes apart different procedures utilized by tricksters - from making fake QR codes that divert clients to phishing sites to infusing malware into apparently innocuous codes. Through genuine contextual analyses and meetings with network safety specialists, "Checking Risk" reveals insight into the refinement and size of these fake exercises. The book fills in as a reminder, encouraging perusers to move toward QR codes with an insightful eye and an uplifted consciousness of likely dangers. While describing Alina Hazel's excursion of succumbing to a QR code trick, the story entwines with functional tips and methodologies to try not to turn into another measurement. From instructing perusers on checking the authenticity of QR codes to advancing the utilization of secure filtering applications, the book enables people to safeguard themselves against the approaching danger. "Checking Risk" rises above the domain of simple useful examples. It investigates the cultural ramifications of QR code fakes, from monetary misfortunes caused by people to the disintegration of confidence in computerized exchanges. The story likewise digs into the endeavors of policing and online protection experts to battle these developing dangers, furnishing perusers with an exhaustive comprehension of the more extensive scene. In a world progressively dependent on computerized interfaces, "Examining Risk" arises as an ideal report, encouraging society to defy the secret perils sneaking behind the harmless exterior of QR codes. Through a mix of individual stories, master experiences, and a source of inspiration, the book fills in as a significant asset for people trying to securely explore the computerized scene.

  • af Gregory J Skulmoski
    264,95 kr.

    Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence; but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations.Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE model of instructional design, Bloom's Taxonomy of Cognitive Thought, and Kirkpatrick's Model of Evaluation, a trilogy of training best practices.Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats leading to more resilient organizations.

  • af C. P. Kumar
    118,95 kr.

    "Safeguarding Against Crime in Everyday Life" is a comprehensive guide that equips readers with essential knowledge and practical strategies to enhance personal safety and security. The book explores the multifaceted landscape of crime, providing insights into its definition and societal impact. Organized into twenty insightful chapters, the book delves into various aspects of crime prevention, from assault and robbery to identity theft and digital security. Readers will learn to recognize and avoid potentially dangerous situations, acquire self-defense techniques, and adopt safe practices for handling valuables. The book also covers topics such as road rage management, responsible drinking, fraud awareness, and community initiatives for violence prevention. With a focus on empowering individuals, the concluding chapter emphasizes the importance of community involvement and awareness, inspiring a culture of responsibility and safety for a more secure future. Whether in public spaces, online, or at home, this book provides a holistic approach to safeguarding against crime in our daily lives.

  • af Samuel Mba James
    189,95 kr.

    Money Laundering: A Comprehensive GuideUnveil the secrets of money laundering and equip yourself to combat financial crime with this definitive guide.Dr. Samuel James, a distinguished medical doctor and MBA graduate from Deakin University, Australia, draws upon his unique expertise to deliver a comprehensive understanding of this complex issue. Through engaging case studies and insightful discussions, you will:Master the intricacies of money laundering, from its definitions and stages to its ever-evolving methods.Navigate the intricate legal framework, including international and national regulations designed to combat financial crime.Gain a deep understanding of the role financial institutions play in Anti-Money Laundering (AML) and their critical responsibilities.Develop essential skills for identifying and assessing money laundering risks, protecting your organization and its stakeholders.Become proficient in Customer Due Diligence (CDD) and Know Your Customer (KYC) practices, ensuring compliance and preventing illicit activities.Understand the crucial role of Suspicious Activity Reports (SARs) and transaction monitoring in detecting and deterring financial crime.Recognize the power of collaboration and information sharing, and how public-private partnerships can effectively tackle money laundering.Explore cutting-edge technologies and trends shaping the future of AML, preparing yourself for the challenges and opportunities ahead.Uncover the devastating impact of money laundering on financial stability and society, highlighting the importance of strong AML measures.Navigate the ethical considerations surrounding money laundering and corporate social responsibility, ensuring ethical conduct in your business practices.Build a robust AML compliance program, equipped with the knowledge and tools to effectively prevent and detect financial crime.This essential guide is indispensable for:Business professionals across all industriesFinancial institutions of all sizesLaw enforcement agencies and regulatorsCompliance officers and risk management professionalsStudents and academics seeking a comprehensive understanding of AMLAnyone concerned about the impact of financial crime on societyEmpower yourself to fight financial crime and contribute to a safer financial system.

  • af Cliff Wang
    1.219,95 kr.

    The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the security and reliability of digital systems using artificial intelligence (AI) technologies. As AI becomes more integrated into various aspects of our lives, the need for reliable and trustworthy AI systems becomes increasingly important. This book is an introduction to all of the above-mentioned areas in the context of AI Embedded Assurance for Cyber Systems.This book has three themes. First, the AI/ML for digital forensics theme focuses on developing AI and ML powered forensic tools, techniques, software, and hardware. Second, the AI/ML for cyber physical system theme describes that AI/ML plays an enabling role to boost the development of cyber physical systems (CPS), especially in strengthening the security and privacy ofCPS. Third, the AI/ML for cyber analysis theme focuses on using AI/ML to analyze tons of data in a timely manner and identify many complex threat patterns.This book is designed for undergraduates, graduate students in computer science and researchers in an interdisciplinary area of cyber forensics and AI embedded security applications. It is also useful for practitioners who would like to adopt AIs to solve cyber security problems.

  • - Strategisk, taktisk, operationelt
    af Karsten Dahl Vandrup & James Hindsgavl Brink
    468,95 kr.

    Arbejder du eller skal du arbejde med cybersikkerhed, it-drift og udvikling? Denne bog giver dig det nødvendige overblik over de gældende love, direktiver og best practices, der er en forudsætning for enhver organisation i Europa i dag.Særligt NIS2 stiller store krav til organisationer – både strategisk, taktisk og operationelt, og i denne bog gennemgår Karsten Dahl Vandrup og James Brinkmann de essentielle sikkerhedskrav og paragraffer, man skal kende og implementere for at være NIS2-compliant. Bogen gennemgår de grundlæggende sikkerhedsprincipper og den grundlæggende sikkerhedsorganisation – og giver et fundament i form af ISO27001-rammeværket, som NIS2 kan opsættes på.NIS2. Strategisk, taktisk, operationelt klæder samtidig læsere læseren på til at forstå, implementere og arbejde med it-sikkerhedsstandarder, så organisationen generelt kan opnå en modenhed, der ikke bare efterlever sikkerhedskrav til ISO27001, GDPR, NIS2 m.v., men også er med til reelt at øge sikkerhedsniveauet gennem struktureret adfærd, rutiner og teknologi.Der er samtidig fokus på governance og compliance for at sikre, at direktion, ledere og andre beslutningstagere er klædt på til at stå i spidsen for strategien, og til at initiere de efterfølgende taktiske implementeringer gennem operationelle retningslinjer, regler og procedurer.Bogen er et nyttigt redskab for folk, der beskæftiger sig med cybersikkerhed, it-drift og udvikling, og den er desuden velegnet som håndbog til arbejdet med kommunikation mellem medarbejdere og it-specialister inden for administration, drift og cybersikkerhed.

  • af Deepanjali Mishra
    1.475,95 kr.

    This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security. The book contains three basic sections namely: the concept of digital violence in policy and practice; the impact of digital violence; and the implication of cyber security to curb such violence. The intention of this book is to equip researchers, practitioners, faculties, and students with critical, practical, and ethical resources to use cyber security and related technologies to help curb digital violence and to support victims. It brings about the needs of technological based education in order to combat gendered crimes like cyberbullying, body-shaming, and trolling that are a regular phenomenon on social media platforms. Topics include societal implications of cyber feminism; technology aided communication in education; cyber security and human rights; governance of cyber law through international laws; and understanding digital violence.

  • af Kristan Stoddart
    1.279,95 kr.

  • af Mark Dery
    172,95 kr.

  • af Iman Almomani
    856,95 kr.

    This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

  • af Geoff White
    175,95 kr.

    For as long as people have been stealing money, there has been an industry ready to wash it. But what happened when our economy went digital? How does the global underworld wash its dirty money in the Internet age?Rinsed reveals how organized crooks have joined forces with the world's most sophisticated cybercriminals. The result: a vast virtual money-laundering machine too intelligent for most authorities to crack. Through a series of jaw-dropping cases and interviews with insiders at all levels of the system, Geoff White shows how thieves are uniting to successfully get away with the most atrocious crimes on an unprecedented scale.The book follows money from the outrageous luxury of Dubai hotels to sleepy backwaters of coastal Ireland, from the backstreets of Nigeria to the secretive zones of North Korea, to investigate this new cyber supercartel. Through first-hand accounts from the victims of their devastating crimes, White uncovers the extraordinary true story of hi-tech laundering - and exposes its terrible human cost.

  • af Rafeal Mechlore
    238,95 kr.

    In the digital age, where our lives are increasingly intertwined with technology, the realm of cyberspace has become a breeding ground for both innovation and criminal activity. "Bytes and Crimes: Navigating Online Threats" is a timely exploration of the complex and evolving landscape of cybersecurity, offering insights into the threats that lurk in the virtual world and strategies to safeguard against them.The Digital Frontier:Our reliance on the internet and technology has ushered in unprecedented convenience and connectivity. However, this interconnectedness has also given rise to a new breed of criminals who exploit vulnerabilities in the digital ecosystem for personal gain. From identity theft and financial fraud to cyberbullying and hacking, the spectrum of online threats is vast and multifaceted.Understanding Cyber Threats:To effectively navigate the digital realm, it is essential to comprehend the nature of cyber threats. "Bytes and Crimes" delves into various forms of cybercrime, such as phishing attacks, ransomware, and data breaches. It sheds light on the motivations behind these crimes, which can range from financial gain to political agendas, and the tactics employed by cybercriminals to achieve their objectives.Safeguarding Your Digital Presence:This exploration of online threats is not meant to invoke fear but to empower individuals and businesses with knowledge and tools to protect themselves. "Bytes and Crimes" provides valuable insights into cybersecurity best practices, emphasizing the importance of strong passwords, regular software updates, and the use of antivirus software. It also highlights the critical role of user awareness in thwarting cyber threats, as human error often plays a significant role in successful cyberattacks.Emerging Technologies and Risks:As technology continues to advance, so do the threats associated with it. The program discusses emerging technologies such as the Internet of Things (IoT) and artificial intelligence and their associated security challenges. It also touches on the implications of privacy concerns and the ethical dimensions of cybersecurity in an era of data-driven decision-making.Cybersecurity as a Collective Responsibility:"Bytes and Crimes" underscores that cybersecurity is not solely the responsibility of IT professionals and law enforcement agencies. It is a collective effort that involves individuals, organizations, and governments. The program encourages viewers to adopt a proactive approach to cybersecurity, emphasizing the importance of education, vigilance, and reporting suspicious activities."Bytes and Crimes: Navigating Online Threats" serves as a comprehensive guide to the digital landscape's dark side. By providing insights into the nature of cyber threats and practical tips for safeguarding digital assets, it empowers individuals and organizations to navigate the digital world with confidence and resilience. In an era where our lives are increasingly lived online, being informed and proactive about cybersecurity is not just advisable-it's imperative.

  • af Reza Montasari
    878,95 - 987,95 kr.

    This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible.As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.

  • af Reza Montasari
    1.304,95 kr.

    This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats, and terrorist activities underline vulnerabilities residing in our current security and digital policing posture. As an interdisciplinary collection of studies, this book encapsulates concepts, theories, and technology applications, offering a comprehensive analysis of current and emerging trends and threats within thecontext of national and international security. Undertaking an evidence-based approach, this book offers an extraordinarily perceptive and detailed account of issues and solutions related to the complex national and international security landscape.To this end, the book:presents insights into emerging and potential technological and methodological solutions as well as advancements in relation to integrated computational and analytical solutions that could be deployed for the purposes of national and international security;provides a comprehensive analysis of technical, ethical, legal, privacy, and civil liberty challenges stemming from the aforementioned advancements;and, accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical, and legal approaches for national and international security uses.The research contained in the book fits well into thelarger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime, and law. It provides a valuable reference for LEAs and security organizations, policymakers, cybersecurity experts, digital forensic practitioners, researchers, academicians, graduates and advanced undergraduates, and other stakeholders with an interest in national and global security.

  • af Phillips Tahuer
    108,95 kr.

    Este libro contiene una descrición del flagelo que significa la piratería en la era moderna. El robo a petroleros o a cruceros turísticos, como asi también el robo de información electrónica o la falsificación de marcas reconocidas. Un detallado análisis de las causas y consecuencias en una lectura amena que atrapa y concientiza por el problema global.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.