Reference Hub5
Combating Security Breaches and Criminal Activity in the Digital Sphere

Combating Security Breaches and Criminal Activity in the Digital Sphere

Copyright: © 2016 |Pages: 309
ISBN13: 9781522501930|ISBN10: 1522501932|EISBN13: 9781522501947
DOI: 10.4018/978-1-5225-0193-0
Cite Book Cite Book

MLA

Geetha, S., and Asnath Victy Phamila, editors. Combating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0193-0

APA

Geetha, S. & Phamila, A. V. (Eds.). (2016). Combating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global. https://doi.org/10.4018/978-1-5225-0193-0

Chicago

Geetha, S., and Asnath Victy Phamila, eds. Combating Security Breaches and Criminal Activity in the Digital Sphere. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0193-0

Export Reference

Mendeley
Favorite Full-Book Download

With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes.

Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board and List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Digital Sphere Threats and Vulnerabilities
This content has been removed at the discretion of the publisher and the editors.
Techniques for Combating Security Breaches
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Cyber Forensics and Investigation
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Visual Information Security
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.