Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
19
result(s) for
"Computer security–Case studies"
Sort by:
Cybersecurity public policy : SWOT analysis conducted on 43 countries
\"This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy. This book seeks to become the gateway to understanding what approaches can best serve the needs of the public and private sector, educating the public, and partnering with governments, parliaments, ministries, and cybersecurity public policy analysts, to help mitigate vulnerabilities currently woven into public and private sector information systems, software, hardware, and web interface applications relied upon for daily business activities\"-- Provided by publisher.
Internet fraud casebook
by
Wells, Joseph T
in
BUSINESS & ECONOMICS / Auditing
,
Computer crimes
,
Computer crimes–Case studies
2010
Real case studies on Internet fraud written by real fraud examiners Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world. Each case outlines how the fraud was engineered, how it was investigated, and how perpetrators were brought to justice Topics included are phishing, on-line auction fraud, security breaches, counterfeiting, and others Other titles by Wells: Fraud Casebook, Principles of Fraud Examination, and Computer Fraud Casebook This book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place.
CRACK99 : the takedown of a $100 million Chinese software pirate /
The \"story of the biggest software piracy case prosecuted by the U.S. Department of Justice\"--Amazon.com.
Technological Turf Wars
2009,2008
InTechnological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.
Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives-does the industry release viruses to generate demand for antivirus software?-and considers the dynamics within companies by looking at facets such as gender bias and power politics.Technological Turf Warsis an informed, enlightened and entertaining view of how the production of computer security technology is fraught with social issues.
Carry on : sound advice from Schneier on security
2014,2013
Up-to-the-minute observations from a world-famous security expert
Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that are valuable for security experts and ordinary citizens alike.
* Bruce Schneier's worldwide reputation as a security guru has earned him more than 250, 000 loyal blog and newsletter readers
* This anthology offers Schneier's observations on some of the most timely security issues of our day, including the Boston Marathon bombing, the NSA's Internet surveillance, ongoing aviation security issues, and Chinese cyber-attacks
* It features the author's unique take on issues involving crime, terrorism, spying, privacy, voting, security policy and law, travel security, the psychology and economics of security, and much more
* Previous Schneier books have sold over 500, 000 copies
Carry On: Sound Advice from Schneier on Security is packed with information and ideas that are of interest to anyone living in today's insecure world.
Technological Turf Wars
by
Johnston, Jessica
in
Business ethics
,
Business ethics -- United States -- Case studies
,
Computer security
2009
Exploring computer security as both a social and technical problem.
Publication
Gurus, hired guns, and warm bodies
2004,2011,2006
Over the last several decades, employers have increasingly replaced permanent employees with temporary workers and independent contractors to cut labor costs and enhance flexibility. Although commentators have focused largely on low-wage temporary work, the use of skilled contractors has also grown exponentially, especially in high-technology areas. Yet almost nothing is known about contracting or about the people who do it. This book seeks to break the silence.
Cyber strategy : the evolving character of power and coercion
by
Valeriano, Brandon
,
Jensen, Benjamin
,
Maness, Ryan C
in
Comparative Politics
,
Cyberspace operations (Military science)
,
Cyberterrorism
2018
This book examines how states integrate cyber capabilities with other instruments of power to achieve foreign policy outcomes. Given North Korea’s use of cyber intrusions to threaten the international community and extort funds for its elites, Chinese espionage and the theft of government records through the Office of Personal Management (OPM) hack, and the Russian hack on the 2016 US election, this book is a timely contribution to debates about power and influence in the 21st century. Its goal is to understand how states apply cyber means to achieve political ends, a topic speculated and imagined, but investigated with very little analytical rigor. Following on Valeriano and Maness’s (2015) book, Cyber War versus Cyber Realities: Cyber Conflict in the International System, this new study explores how states apply cyber strategies, using empirical evidence and key theoretical insights largely missed by the academic and strategy community. It investigates cyber strategies in their integrated and isolated contexts, demonstrating that they are useful to managing escalation and sending ambiguous signals, but generally they fail to achieve coercive effect.
Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation
2020,2018
Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and “computational cognitivism,” involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: • Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy • Determination of the limiting capabilities • Possible scientific and technical solutions • Organization of perspective research studies in the area of Digital Economy cyber security in Russia.