Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
86,827
result(s) for
"Computer crimes"
Sort by:
Cybercrime
by
Gray, Leon, 1974- author
in
Computer crimes Juvenile literature.
,
Computer crimes Investigation Juvenile literature.
,
Computer crimes.
2014
Explains the many areas of cybercrime, including worms, viruses, fraud, hacking, and cyberbullying.
Cybersecurity - A Self-Teaching Introduction
by
Garg, Amit
,
Goyal, K. K
in
Business enterprises
,
COM053000 COMPUTERS / Security / General
,
Computer networks
2020
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, Cyberlaw, and more. Features: Provides an overview of cybersecurity and cybercrime subjects in an easy to understand, self-teaching format; Includes discussion of information systems, cryptography, data and network security, threats and viruses, electronic payment systems, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, and more.
Cyber Security
by
David Sutton
in
COMPUTERS
2022
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen.
Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation.
• A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession
• Offers practical guidance and actionable steps for individuals and businesses to protect themselves
• Highly accessible and terminology is clearly explained and supported with current, real-world examples
The Human Factor of Cybercrime
by
Rutger Leukfeldt
,
Thomas J. Holt
in
Big Data
,
Computer crimes-Social aspects
,
Computer Fraud, Hacking & Viruses
2019,2020
Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime.
The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.
Thinking critically : cybercrime
Computer crimes such as hacking, online fraud, identity theft, and cyber terror attacks have been on the rise for years. Through a narrative-driven pro/con format supported by relevant facts, quotes, anecdotes, and full-color illustrations this title examines issues related to cybercrime.
Crime Dot Com
2020
On May 4, 2000, an email that read \"kindly check the attached LOVELETTER\" was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States' hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it.
Cybercrime
Discusses issues relating to cybercrime, computer security, and data security.
The Deviant Security Practices of Cyber Crime
2021
This is the first book to present a full, socio-technical-legal picture on the security practices of cyber criminals, based on confidential police sources related to some of the world's most serious and organized criminals.