Cyber Power : Crime, Conflict and Security in Cyberspace

個数:

Cyber Power : Crime, Conflict and Security in Cyberspace

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 220 p.
  • 言語 ENG
  • 商品コード 9781466573048
  • DDC分類 364.168

Full Description


Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-risk related domains, both from a civilian and a military perspective. Explaining fundamental principles in an interdisciplinary manner, it sheds light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies.

Contents

Preface and AcknowledgementAcknowledgementDedicationForewordCybercrime and Cybersecurity Issues: Stakes and Challenges for the 21st CenturyUnderstanding the contextThe risks and the needsSupporting and developing the digital societyCybersecurity expectationsSummaryExercisesCyberspace and Internet: a New Paradigm for Crime and ConflictsUnderstanding the contextThe characteristics of cybercrimesThe Internet: empowering criminalsSummary in 10 tipsExercisesCybercrimes Against PersonsUnderstanding the contextAffecting people's dignity and integritySwindles and frauds over the InternetIdentity crimesPrivacy related offencesTechnological innovation and responsibilitySummaryExercicesCybercrimes Against AssetsUnderstanding the contextThe typology of the main crimes against assetsFrauds and scamsSummary of offences from a technological perspectiveCase study from the FBIExercisesCybercrimes Against StatesUnderstanding the contextExamples of cybercriminal activities that can affect statesCyberthreats against statesSummaryExercisesCyberconflicts, Cyberwars and CyberpowerUnderstanding the contextFrom cybercrime to cyberwarCyberwarInformation warCyberterrorism: a particular kind of cyberconflictCybercrime or cyber conflictSummaryExercisesUnderstanding CybercriminalsUnderstanding the contextTowards a classification of cybercriminalsAbout hacking and hackersHackers' conventions, contests, and schoolPortraits of hackersSummaryExercicesThe Cybercriminal's ToolkitsUnderstanding the contextFundamental principles and constant factors of cyberattacksSpam and phishing: assets for criminalsMeans of obtaining connection parameters to access systemsSome basic attacksThe black market of cybercriminalitySummaryExercisesThe Fight Against CybercrimeUnderstanding the contextStrengthening legislation is not enoughAn integrative approach and a global strategyThe principal challenges in combating cybercrime at the international levelSome privacy related considerationsSummaryExercisesThe Global Cybercrime Ecosystem and Cybercriminal InvestigationUnderstanding the contextThe place of the struggle against cybercriminality in the cybercriminal ecosystemCybercriminal investigationThe idea of digital evidenceFundamental concepts in computer crime investigationInvestigating computer crimes within organizationsSummaryExercisesA Global Approach to CybersecurityUnderstanding the contextThe evolution of information securityAvoiding the cybersecurity gapA systemic approach to cybersecuritySummaryExercisesCybersecurity Governance and Security MeasuresUnderstanding the contextManaging the risksDefining a security policyUnderstanding ICT security from a technical point of viewA functional approach to generic security toolsCyber security as a competitive advantageSummaryExercisesCyberconflict & Cybercrime: Prospects for a Global ResponseUnderstanding the contextSome complex and global questionsFor an international treaty: a contribution to stability in cyberspaceConnecting the world responsiblySummaryExercisesGlossary of main cybercrime and cybersecurity related termsAnnex: Some referencesIndex

最近チェックした商品