Reference Hub10
Indices2
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications

Copyright: © 2011 |Pages: 316
ISBN13: 9781616928056|ISBN10: 1616928050|EISBN13: 9781616928070
DOI: 10.4018/978-1-61692-805-6
Cite Book Cite Book

MLA

Holt, Thomas J., and Bernadette H. Schell, editors. Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. IGI Global, 2011. https://doi.org/10.4018/978-1-61692-805-6

APA

Holt, T. J. & Schell, B. H. (Eds.). (2011). Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. IGI Global. https://doi.org/10.4018/978-1-61692-805-6

Chicago

Holt, Thomas J., and Bernadette H. Schell, eds. Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61692-805-6

Export Reference

Mendeley
Favorite Full-Book Download

In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the “cyber criminal curve.”

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice, Business, and Information Technology Security from around the world, this book presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Background  (pages 17-17)
Background
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Frameworks and Models  (pages 86-86)
Frameworks and Models
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Empirical Assessments  (pages 104-104)
Empirical Assessments
This content has been removed at the discretion of the publisher and the editors.
Marco-System Issues Regarding Corporate and Government Hacking and Network Intrusions
This content has been removed at the discretion of the publisher and the editors.
Policies, Techniques, and Laws for Protection
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.