|
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals:
* Who your greatest security threats really are (be prepared for some surprises!)
* Why employees undergoing divorce can be your organization's greatest computer security risk
* How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems.
* Effective countermeasures for each threat covered in the book
* How to neutralize even the most powerful cybercrime scheme attempts
* Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized |
|
|
Wireless Mesh NetworksWireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking... | | Design Methods for Reactive Systems: Yourdon, Statemate, and the UMLDesign Methods for Reactive Systems describes methods and techniques for the design of software systemsparticularly reactive software systems that engage in stimulus-response behavior. Such systems, which include information systems, workflow management systems, systems for e-commerce, production control systems, and embedded... | | |
|