Combatting cybercrime and cyberterrorism: challenges, trends and priorities
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2016]
|
Schriftenreihe: | Advanced sciences and technologies for security applications
|
Schlagworte: | |
Online-Zugang: | DE-B1533 DE-634 DE-355 DE-824 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (xii, 321 Seiten) Illustrationen, Diagramme |
ISBN: | 9783319389301 |
ISSN: | 1613-5113 |
DOI: | 10.1007/978-3-319-38930-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043579532 | ||
003 | DE-604 | ||
005 | 20240603 | ||
007 | cr|uuu---uuuuu | ||
008 | 160601s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319389301 |c Online |9 978-3-319-38930-1 | ||
024 | 7 | |a 10.1007/978-3-319-38930-1 |2 doi | |
035 | |a (ZDB-2-SLS)978-3-319-38930-1 | ||
035 | |a (OCoLC)951028064 | ||
035 | |a (DE-599)BVBBV043579532 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-B1533 |a DE-739 |a DE-824 |a DE-355 |a DE-11 | ||
082 | 0 | |a 364.168 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Combatting cybercrime and cyberterrorism |b challenges, trends and priorities |c Babak Akhgar, Ben Brewster, editors |
264 | 1 | |a Cham |b Springer |c [2016] | |
300 | |a 1 Online-Ressource (xii, 321 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advanced sciences and technologies for security applications | |
650 | 4 | |a Social sciences | |
650 | 4 | |a Computer security | |
650 | 4 | |a System safety | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Social Sciences | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Sozialwissenschaften | |
700 | 1 | |a Akhgar, Babak |0 (DE-588)1051499909 |4 edt | |
700 | 1 | |a Brewster, Ben |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-38929-5 |w (DE-604)BV043732055 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-38930-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LCR |a ZDB-2-SLS | ||
940 | 1 | |q ZDB-2-LCR_2016 | |
966 | e | |u https://doi.org/10.1007/978-3-319-38930-1 |l DE-B1533 |p ZDB-2-SLS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-38930-1 |l DE-634 |p ZDB-2-LCR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-38930-1 |l DE-355 |p ZDB-2-LCR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-38930-1 |l DE-824 |p ZDB-2-SLS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-38930-1 |l DE-739 |p ZDB-2-SLS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805075243584192512 |
---|---|
adam_text |
COMBATTING CYBERCRIME AND CYBERTERRORISM
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART 1- APPROACHING CYBERCRIME AND CYBERTERRORISM RESEARCH
PART 2- LEGAL, ETHICAL AND PRIVACY CONSIDERATIONS
PART 3- TECHNOLOGIES, SCENARIOS AND BEST PRACTICES
PART 4- POLICY DEVELOPMENT AND ROADMAPS FOR CC/CT RESEARCH
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
COMBATTING CYBERCRIME AND CYBERTERRORISM
/
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK COMPRISES AN AUTHORITATIVE AND ACCESSIBLE EDITED COLLECTION OF
CHAPTERS OF SUBSTANTIAL PRACTICAL AND OPERATIONAL VALUE. FOR THE VERY
FIRST TIME, IT PROVIDES SECURITY PRACTITIONERS WITH A TRUSTED REFERENCE
AND RESOURCE DESIGNED TO GUIDE THEM THROUGH THE COMPLEXITIES AND
OPERATIONAL CHALLENGES ASSOCIATED WITH THE MANAGEMENT OF CONTEMPORARY
AND EMERGING CYBERCRIME AND CYBERTERRORISM (CC/CT) ISSUES. BENEFITING
FROM THE INPUT OF THREE MAJOR EUROPEAN COMMISSION FUNDED PROJECTS THE
BOOK'S CONTENT IS ENRICHED WITH CASE STUDIES, EXPLANATIONS OF STRATEGIC
RESPONSES AND CONTEXTUAL INFORMATION PROVIDING THE THEORETICAL
UNDERPINNING REQUIRED FOR THE CLEAR INTERPRETATION AND APPLICATION OF
CYBER LAW, POLICY AND PRACTICE, THIS UNIQUE VOLUME HELPS TO CONSOLIDATE
THE INCREASING ROLE AND RESPONSIBILITY OF SOCIETY AS A WHOLE, INCLUDING
LAW ENFORCEMENT AGENCIES (LEAS), THE PRIVATE SECTOR AND ACADEMIA, TO
TACKLE CC/CT. THIS NEW CONTRIBUTION TO CC/CT KNOWLEDGE FOLLOWS A
MULTI-DISCIPLINARY PHILOSOPHY SUPPORTED BY LEADING EXPERTS ACROSS
ACADEMIA, PRIVATE INDUSTRY AND GOVERNMENT AGENCIES. THIS VOLUME GOES
WELL BEYOND THE GUIDANCE OF LEAS, ACADEMIA AND PRIVATE SECTOR POLICY
DOCUMENTS AND DOCTRINE MANUALS BY CONSIDERING CC/CT CHALLENGES IN A
WIDER PRACTICAL AND OPERATIONAL CONTEXT. IT JUXTAPOSES PRACTICAL
EXPERIENCE AND, WHERE APPROPRIATE, POLICY GUIDANCE, WITH ACADEMIC
COMMENTARIES TO REFLECT UPON AND ILLUSTRATE THE COMPLEXITY OF CYBER
ECOSYSTEM ENSURING THAT ALL SECURITY PRACTITIONERS ARE BETTER INFORMED
AND PREPARED TO CARRY OUT THEIR CC/CT RESPONSIBILITIES TO PROTECT THE
CITIZENS THEY SERVE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author2 | Akhgar, Babak Brewster, Ben |
author2_role | edt edt |
author2_variant | b a ba b b bb |
author_GND | (DE-588)1051499909 |
author_facet | Akhgar, Babak Brewster, Ben |
building | Verbundindex |
bvnumber | BV043579532 |
classification_rvk | ST 277 |
collection | ZDB-2-LCR ZDB-2-SLS |
ctrlnum | (ZDB-2-SLS)978-3-319-38930-1 (OCoLC)951028064 (DE-599)BVBBV043579532 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Informatik |
doi_str_mv | 10.1007/978-3-319-38930-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV043579532</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240603</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160601s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319389301</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-38930-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-38930-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SLS)978-3-319-38930-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)951028064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043579532</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-B1533</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Combatting cybercrime and cyberterrorism</subfield><subfield code="b">challenges, trends and priorities</subfield><subfield code="c">Babak Akhgar, Ben Brewster, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 321 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced sciences and technologies for security applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sozialwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Akhgar, Babak</subfield><subfield code="0">(DE-588)1051499909</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brewster, Ben</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-38929-5</subfield><subfield code="w">(DE-604)BV043732055</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-38930-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LCR</subfield><subfield code="a">ZDB-2-SLS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LCR_2016</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-38930-1</subfield><subfield code="l">DE-B1533</subfield><subfield code="p">ZDB-2-SLS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-38930-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-38930-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-38930-1</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-SLS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-38930-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SLS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043579532 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T05:38:18Z |
institution | BVB |
isbn | 9783319389301 |
issn | 1613-5113 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028994205 |
oclc_num | 951028064 |
open_access_boolean | |
owner | DE-634 DE-B1533 DE-739 DE-824 DE-355 DE-BY-UBR DE-11 |
owner_facet | DE-634 DE-B1533 DE-739 DE-824 DE-355 DE-BY-UBR DE-11 |
physical | 1 Online-Ressource (xii, 321 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-LCR ZDB-2-SLS ZDB-2-LCR_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series2 | Advanced sciences and technologies for security applications |
spelling | Combatting cybercrime and cyberterrorism challenges, trends and priorities Babak Akhgar, Ben Brewster, editors Cham Springer [2016] 1 Online-Ressource (xii, 321 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Advanced sciences and technologies for security applications Social sciences Computer security System safety Computer crimes Social Sciences Cybercrime Systems and Data Security Security Science and Technology Sozialwissenschaften Akhgar, Babak (DE-588)1051499909 edt Brewster, Ben edt Erscheint auch als Druckausgabe 978-3-319-38929-5 (DE-604)BV043732055 https://doi.org/10.1007/978-3-319-38930-1 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Combatting cybercrime and cyberterrorism challenges, trends and priorities Social sciences Computer security System safety Computer crimes Social Sciences Cybercrime Systems and Data Security Security Science and Technology Sozialwissenschaften |
title | Combatting cybercrime and cyberterrorism challenges, trends and priorities |
title_auth | Combatting cybercrime and cyberterrorism challenges, trends and priorities |
title_exact_search | Combatting cybercrime and cyberterrorism challenges, trends and priorities |
title_full | Combatting cybercrime and cyberterrorism challenges, trends and priorities Babak Akhgar, Ben Brewster, editors |
title_fullStr | Combatting cybercrime and cyberterrorism challenges, trends and priorities Babak Akhgar, Ben Brewster, editors |
title_full_unstemmed | Combatting cybercrime and cyberterrorism challenges, trends and priorities Babak Akhgar, Ben Brewster, editors |
title_short | Combatting cybercrime and cyberterrorism |
title_sort | combatting cybercrime and cyberterrorism challenges trends and priorities |
title_sub | challenges, trends and priorities |
topic | Social sciences Computer security System safety Computer crimes Social Sciences Cybercrime Systems and Data Security Security Science and Technology Sozialwissenschaften |
topic_facet | Social sciences Computer security System safety Computer crimes Social Sciences Cybercrime Systems and Data Security Security Science and Technology Sozialwissenschaften |
url | https://doi.org/10.1007/978-3-319-38930-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994205&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT akhgarbabak combattingcybercrimeandcyberterrorismchallengestrendsandpriorities AT brewsterben combattingcybercrimeandcyberterrorismchallengestrendsandpriorities |