Indices1
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Copyright: © 2019 |Pages: 334
ISBN13: 9781522582410|ISBN10: 152258241X|EISBN13: 9781522582427|ISBN13 Softcover: 9781522583202
DOI: 10.4018/978-1-5225-8241-0
Cite Book Cite Book

MLA

Geetha, S., and Asnath Victy Phamila, editors. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8241-0

APA

Geetha, S. & Phamila, A. V. (Eds.). (2019). Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI Global. https://doi.org/10.4018/978-1-5225-8241-0

Chicago

Geetha, S., and Asnath Victy Phamila, eds. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8241-0

Export Reference

Mendeley
Favorite Full-Book Download

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security.

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
National Security and Cyber Warfare
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Critical IoT Infrastructure Security
This content has been removed at the discretion of the publisher and the editors.
Emerging Trends and Methods for Cyber Forensics
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Techniques for Countering Cyber Attacks
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.