Sold Out
Book Categories |
Computer crimes and the invasion of privacy by electronic means are major concerns for many people. They threaten the future of access to information by allied uses of electronic communication media. Chapter One provides information on the underlying infrastructure and communication protocols to help in understanding computer crimes and the dangers associated with them. Chapter Two categorizes cyber attacks by various motives--personal, pleasure-seeking, attention-seeking, revenge or even vendetta, financial escapades and raw hate. Likely targets and security issues in the day-to-day computer augmented settings are discussed in Chapter Three. Chapter Four addresses the costs of computer crimes to individuals, to the nation and to businesses and their clients. Crime prevention is the topic of Chapter Five, which describes the efforts being made by individuals, civic groups, institutions, nations and multinational bodies to eliminate computer crime. Chapter Six assesses the future of cyber attacks by looking at the changing technology, the availability of computer access to the wrong people, and education and crime prevention measures. The mind of the computer hacker is explored at length.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionComputer network security and cyber ethics
X
This Item is in Your InventoryComputer network security and cyber ethics
X
You must be logged in to review the productsX
X
X
Add Computer network security and cyber ethics, , Computer network security and cyber ethics to the inventory that you are selling on WonderClubX
X
Add Computer network security and cyber ethics, , Computer network security and cyber ethics to your collection on WonderClub |