Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Public Policy Issues (K.4.1) > Abuse And Crime Involving Computers (K.4.1...)  
 
Options:
 
  1-10 of 81 Reviews about "Abuse And Crime Involving Computers (K.4.1...)": Date Reviewed
  Digital forensic science: issues, methods, and challenges
Roussev V.,  Morgan & Claypool Publishers, San Rafael, CA, 2016. 156 pp. Type: Book (978-1-627059-59-6)

Digital forensics is a challenging field that is becoming even more challenging over time due to changing technologies and computing paradigms. As computing moves more and more to mobile devices and cloud services, and away from traditional deskto...

Jul 12 2017
  Handbook of biometrics for forensic science
Tistarelli M., Champod C.,  Springer International Publishing, New York, NY, 2017. 369 pp. Type: Book (978-3-319506-71-5)

Biometric samples have been used in forensic examinations for decades. However, this book is a compilation of efforts by several groups to systematize the union of the two sciences into a body of knowledge to be used, in concert, for criminal inve...

Jun 22 2017
  Digital defense: a cybersecurity primer
Pelton J., Singh I.,  Springer International Publishing, New York, NY, 2015. 209 pp. Type: Book (978-3-319199-52-8), Reviews: (2 of 2)

Digital defense is a well-written, easy-to-follow, practical book, suitable for personal as well as professional use....

Jan 19 2017
  Combatting cybercrime and cyberterrorism: challenges, trends and priorities
Akhgar B., Brewster B.,  Springer International Publishing, New York, NY, 2016. 306 pp. Type: Book (978-3-319389-29-5)

Cybercrime investigations are different from traditional crime investigation, requiring in-depth technical expertise and large-scale cross-jurisdictional effort. In May 2016, a well-organized group of 100 in Tokyo used stolen South African credit ...

Oct 13 2016
  Automated inference of past action instances in digital investigations
James J., Gladyshev P.  International Journal of Information Security 14(3): 249-261, 2015. Type: Article

The role of computers in forensics is expanding, since so much crime uses electronic devices. Developing support mechanisms for digital investigation is the need of the hour. However, a great number of lacunae exist in devising suitable digital in...

Apr 12 2016
  Cyber denial, deception and counter deception: a framework for supporting active cyber defense
Heckman K., Stech F., Thomas R., Schmoker B., Tsow A.,  Springer Publishing Company, Incorporated, New York, NY, 2015. 251 pp. Type: Book (978-3-319251-31-8)

This appropriately titled book belongs on the bookshelf of information security (InfoSec) professionals everywhere. Cyber denial, cyber deception, and other related topics are core issues affecting InfoSec at both tactical and strategic levels. Th...

Mar 25 2016
  Digital defense: a cybersecurity primer
Pelton J., Singh I.,  Springer International Publishing, New York, NY, 2015. 209 pp. Type: Book (978-3-319199-52-8), Reviews: (1 of 2)

Do you have elderly or young relatives who use the Internet? Do you need a clear, nontechnical, small (200 pages) book to explain basic cybersecurity? If so, this is for you. Written for a general audience, with end-of-chapter references for the m...

Dec 22 2015
  Deanonymisation of clients in bitcoin P2P network
Biryukov A., Khovratovich D., Pustogarov I.  CCS 2014 (Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ,  Nov 3-7, 2014) 15-29, 2014. Type: Proceedings

Detailed descriptions of some parts of the bitcoin code that are not documented well are contained in this paper. Those trying to understand how the bitcoin code works should read this paper to start their journey. However, I am concerned about th...

Nov 11 2015
  Hacking web intelligence: open source intelligence and web reconnaissance concepts and techniques
Chauhan S., Panda N.,  Syngress Publishing, Waltham, MA, 2015. 300 pp. Type: Book (978-0-128018-67-5)

Hacking web intelligence is a very interesting exploration of tools that exist on the Internet for gathering open-source intelligence (OSINT), information gathered using open-source tools from publicly available sources. But the book goes b...

Oct 30 2015
  This is why we can’t have nice things: mapping the relationship between online trolling and mainstream culture
Phillips W.,  The MIT Press, Cambridge, MA, 2015. 256 pp. Type: Book (978-0-262028-94-3)

An Internet troll is a person who derives satisfaction from creating an unpleasant online experience for others. This includes a wide variety of behaviors carried out for a wide variety of reasons. Trolls appear in chat rooms, on bulletin boards, ...

Sep 15 2015
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy