Cybercrime and security
Alan E. Brill, Fletcher N. Baldwin, Robert John Munro
Oceana Publications, 1998 - Computers
Access the Security Management Strategies of Experts In this age of global electronic commerce, where transactions are conducted almost instantly, there is no greater threat to a company's success than the security of its data & information systems. This set will help you determine the best methods to secure your data, protect your communications infrastructure, & keep you up to date on the laws & regulations governing this area. Infrastructure Protection & Management Solutions This timely set examines security threats to your network & computer infrastructure & provides the measures taken by corporations & the U.S. government to manage the risk of Internet intrusion, computer viruses, & to secure critical infrastructure protection. Documents are presented examining regulation of the Internet & encryption technology on both the national & international levels. Covers Critical Issues in E-Commerce Including: * Cyberpayments, Collection of Digital Signatures, & Cryptography * Electronic Consumer Protection * Counterfeit Access Devices & Automated Cybercrimes * Prosecution of Violations of Intellectual Property Rights * Investigating & Prosecuting Network Intrusion * Collection & Handling Virtual Evidence Support for Law Enforcement & Security Management Professionals Articles & essays from recognized security professionals are included on a full range of issues, including computer forensics, data remanence, & the overall challenges to law enforcement by electronic communications & transactions via the Internet. Extensive management training & application tools are included along with case studies & checklists for practical application. Statutes, regulations, court opinions, administrative proceedings & a comprehensive bibliography & glossary are provided to illustrate strategies & tools useful for protecting information from the evolving tactics of cybercriminals. Federal guidelines for searching & seizing computers are included.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Table of Contents
Why put the e in eevidence?
What Information can be discovered?
75 other sections not shown
Other editions - View all
activities Advance Fee Fraud agencies anti-spam applications Australia authorities bank best practices Canada co-operation co-ordination Code communication companies Competition Bureau Computer Crime Computer Forensics Convention on Cybercrime corporate court criminal critical infrastructure culture of security Cyber Security cyberbullying cybercrime digital evidence documents e-mail electronic discovery electronic evidence employees encryption established example expert Federal files filters firewall framework Guidelines identify implementation industry information security information systems initiatives Internet Internet Service Providers investigation IPv6 ISPs issues laptop law enforcement legislation MAAWG malware Member countries messages Ministry National Nigeria OECD Office operating organisations organizations passwords person phishing Phone private sector procedures Protocol relevant response risk scam server spam spammers specific spyware standards strategy suicide target Task Force technical Technology terrorist tion traffic United users