
Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
- Length: 338 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2021-10-28
- ISBN-10: 0367251574
- ISBN-13: 9780367251574
- Sales Rank: #0 (See Top 100 Books)
https://faroutpodcast.com/i32ekd6 https://semichaschaver.com/2025/04/03/u3676c7kn1 Cybercrime and Information Technology: Theory and Practice―The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
Buy Soma From Canada While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.
Discount Cheap Pills Tramadol The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations―something the law is often slow to move on given the current speed in which technology advances.
https://townofosceola.com/4al6pfo Key Features:
- Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
- Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
- Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
- Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.
source site Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.
https://mhco.ca/619ihhci55v An Instructor’s Manual with Test Bank and chapter PowerPoint slides is available to qualified professors for use in classroom instruction.
click Cover Half Title Title Page Copyright Page Table of Contents Preface Acknowledgment Author’s Bio Chapter 1 Understanding Essential Computer Concepts Objectives 1.1 Understanding Computation Conventional Computer Systems 1.2 Input Understanding Binary Data Conversion from Binary to Decimal Conversion from Decimal to Binary Hexadecimal Converting from Hexadecimal to Binary Conversion from Binary to Hexadecimal ASCII, EBCDIC and UNICODE 1.3 Processing Boolean Algebra, Logic Gates, and Truth Tables Processor Types (32-bit Processors vs 64-bit Processors) 1.4 Storage Compression Lossy Compression Lossless Compression 1.5 Output Pixels Color Depth Color Models Screen Resolution 1.6 Beyond Conventional Computing Quantum Computing Is Poised to Change Everything 1.7 A Brief History of Computing Devices 1.8 Conclusion 1.9 Key Words Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society Objectives 2.1 Cybercrime and the Cybercriminal 2.2 The Origin and Definition of Cybercrime – It’s the Data, Always the Data 2.3 Brief Summary of the Phases and Evolution of Cybercrime Phase I Phase II Phase III Phase IV 2.4 Cybercrime Categories The Three Cybercrime Categories 2.5 The Future of Cybercrime The Making of the Cybercriminal Cybercrime and the Internet of Things (IoT) Cybercrime: Machine Learning and Artificial Intelligence Online Child Sexual Abuse and Exploitation (CSAE) Cost of Cybercrime The Role of Cryptocurrency in Cybercrime State-Sponsored Cyberwarfare and Industrial Espionage 2.6 Conclusion 2.7 Key Words Chapter 3 Understanding the U.S. Legal System Objectives 3.1 Introduction I. Jurisdiction and Extradition II. Online Anonymity III. Digital Evidence IV. Most Cybercrimes Are not Reported 3.2 A Brief Overview of the Legal System in the United States I. The Constitution II. Statutory or Statute Law III. Administrative Laws (Agency Regulations) and Ordinance Law IV. Judicial Decisions or Precedents or Case Law 3.2.1 The Courts System 3.3 Types of Laws 3.3.1 Administrative Law 3.3.2 Civil Law 3.3.3 Criminal Law 3.4 Conclusion 3.5 Key Words Chapter 4 Laws, Standards, and Regulations Affecting Cybercrime Objectives 4.1 Introduction 4.1.1 Current Legislative Framework in the United States 4.2 Anti-Hacking Laws 4.2.1 The Federal Computer Fraud and Abuse Act 4.2.1.1 Key Terms and Major Cases to Understand CFAA 4.2.1.2 Limitations of the CFAA 4.2.2 Computer Hacking Laws from Individual States 4.2.3 The Economic Espionage Act of 1996 (EEA) 4.2.3.1 Important Cases 4.2.4 The Digital Millennium Copyright Act 4.2.4.1 Penalties for 17 U.S.C. § 4.2.4.2 Important Cases 4.3 Data Security Laws and Regulations in the Private Sector Entities 4.3.1 The National Institute of Standards and Technology Cybersecurity Framework 4.3.2 Laws Dealing with Healthcare 4.3.2.1 The Health Insurance Portability and Accountability Act (HIPAA) 4.3.2.2 Penalties for Violating HIPAA Rule 4.3.3 Health Information Technology for Economic and Clinical Health Act 4.3.4 Protecting Consumers’ Privacy Rights with FTC’s Section 5: Federal Trade Commission Act 4.3.4.1 Important FTC Cases 4.3.5 Laws Affecting Financial Institutions 4.3.5.1 The Gramm-Leach-Bliley Act of 1999 (GLBA) 4.3.5.2 Red Flags Rule 4.3.6 Laws Affecting Utilities 4.3.6.1 The Federal Energy Regulatory Commission 4.3.6.2 Nuclear Regulatory Commission 4.4 Public and Private Sector Entities Partnerships in Cyberspace 4.4.1 Cybersecurity Information Sharing Act of 2015 (CISA) 4.4.2 The Cybersecurity and Infrastructure Security Agency 4.4.3 The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA) 4.4.4 Cybersecurity Enhancement Act of 2014 (CEA) 4.5 Cybersecurity Requirements for Federal Government Contractors 4.5.1 Federal Information Security Modernization Act of 4.5.2 NIST Information Security Controls for Government Agencies and Contractors 4.6 Most Important Internet Surveillance Laws in the United States 4.6.1 All Writs Act 4.6.1.1 Significant Case 4.6.2 Fourth Amendment 4.6.2.1 Search and Seizure 4.6.2.2 Exceptions to the Search Warrant Rule 4.6.2.3 Electronic Surveillance: Private vs Public 4.6.2.4 Exclusionary Rule and the Good Faith Exception 4.6.2.5 The USA PATRIOT Act and the Fourth Amendment 4.6.3 Electronic Communication Privacy Act of 4.6.4 Communication Assistant for Law Enforcement Act of 1994 (CALEA) 4.7 Key Privacy Laws in the United States 4.7.1 Privacy Act of 4.7.2 Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) 4.7.3 18 U.S.C. § 1037 Fraud and Related Activity in Connection with Electronic Mail 4.7.4 18 U.S.C. § 1029 Fraud and Related Activity in Connection with Access Devices 4.7.5 18 U.S. Code § 1028 Fraud and Related Activity in Connection with Identification Documents, Authentication Features, and Information 4.7.6 Children’s Online Privacy Protection Act of 4.7.7 Video Privacy Protection Act (VPPA) of 4.7.8 When the United States Began Taking Privacy Seriously 4.8 Conclusion 4.9 Key Words Chapter 5 The Networking Environment Objectives 5.1 Introduction to Computer Networking 5.1.1 Protocols 5.1.2 The World Wide Web and the Internet 5.1.3 Advantages and Disadvantages 5.1.4 Essential Computer Network Components and Terminology 5.1.5 Basic Anatomy of IPv6 5.1.6 Using Network Utilities 5.2 Types of Networks 5.3 Network Topology 5.4 The Open Systems Interconnection (OSI) Model 5.5 The Internet Protocol Suite (TPC/IP) 5.5.1 TCP 5.5.2 UDP 5.6 How Everything Works Together on the Internet: A Review 5.7 Conclusion 5.8 Key Words Chapter 6 Computer Security Technology and Principles Objectives 6.1 Introduction 6.2 Understanding Security Terminology 6.3 Types of Cyberattacks 6.3.1 Adware 6.3.2 Denial-of-Service Attacks 6.3.2.1 Notable DDoS Attacks 6.3.2.2 DoS Attacking Tools 6.3.3 Malware 6.3.4 Phishing 6.3.5 Spoofing 6.3.6 Structured Query Language (SQL) Injection or (SQLI) 6.3.7 Wi-Fi Hacking 6.4 Prevention Mechanisms 6.4.1 If You Connect It, Protect It 6.4.2 Types of Firewalls 6.5 Identification, Authentication, and Authorization 6.6 Modern Encryption 6.6.1 Symmetric Encryption or Secret Key Cryptography (SKC) 6.6.2 Asymmetric Encryption or Public Key Cryptography or Asymmetric Cryptography 6.6.3 Digital Certificates and Certificate Authority 6.6.4 Hash Functions or Hashing Algorithms What Does “Salting” a Hashtag Mean? 6.7 Conclusion 6.8 Key Words Chapter 7 Internet of Things (IoTs) Objectives 7.1 The Internet of Things—An Introduction 7.2 A Summary of IoT Applications 7.2.1 Automotive Sector 7.2.2 Energy Sector 7.2.3 Healthcare Sector 7.2.4 Manufacturing Sector 7.2.5 Retail Sector 7.2.6 Smart Structures (Buildings, Roads, and Bridges Sector) 7.2.7 Smart Homes 7.2.8 Transportation Sector 7.3 IoT Components, Data Processing Architectures, and Protocols 7.3.1 Basic Components and Data Processing 7.3.2 Big Data in IoT 7.3.3 Architectures 7.3.4 Protocols and Standards 7.4 Network Consideration for IoT Devices 7.5 Security 7.6 Conclusion 7.7 Key Words Chapter 8 Mobile Devices: The Smartphone Objectives 8.1 Introduction 8.2 A Brief History and Significant Milestones of Mobile Phones 8.3 Components, Operating Systems (OS), Applications and Architecture 8.3.1 Main Components 8.3.2 Operating Systems (OS) and Applications (apps) 8.3.3 Platform Architectures 8.4 The Cellular Network 8.4.1 What Happens When a Mobile Phone Is Turned On? 8.4.2 The Cell Tower or Cellular Base Station 8.4.3 Mobile Device Tracking Location: Cell Towers, GPS, and Indoor Localization 8.5 Security 8.5.1 Physical Security 8.5.2 Executable Security 8.6 Conclusion 8.7 Key Words Appendix A: A Complete Text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030. Appendix B: 17 U.S.C. § 1201 Circumvention of Copyright Protection Systems Appendix C: HIPAA §164.308 Administrative Safeguards Appendix D Appendix E: 15 U.S.C. Appendix F Appendix G Appendix H Appendix I: Valuable IT and Management Certifications Index
watch 1. Disable the follow link AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.