Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Cyber Crime, Security and Digital Intelligence (eBook)


ISBN13: 9781317155348
Published: August 2013
Publisher: Gower Publishing Limited
Country of Publication: UK
Format: eBook (ePub)
Price: Out of print
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in
Korea, [North] Democratic Peoples Republic Of

Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.30am to 5.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

Need help with ebook formats?




Also available as
£75.00
+ £15.00 VAT

Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority.

In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables.

Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations.

Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without.

Mark Johnson has spent over 30 years in operational risk management, fraud control and security, mainly in high-tech environments. A former head of fraud control at Cable & Wireless PLC, he has been engaged on major fraud, revenue assurance, cyber security and corporate digital intelligence projects worldwide. He is also a successful trainer and industry speaker, as well as being the author of one previous book, Demystifying Communications Risk, published by Gower. Mark is married, with four children, and currently resides in Cambridgeshire.

Subjects:
Criminal Law, eBooks, IT, Internet and Artificial Intelligence Law
Contents:
Preface
Part 1: Introduction
Threats to key sectors
Cyber security fundamentals
Cyber attack fundamentals
Organised cyber attacks
Cloud risks
Web 2.0 risks
Cyber security threat actors
Common vulnerabilities
Part 2: Cyber security control frameworks
Cyber security
Digital intelligence
The future of cyber security
Appendix
Recommended readings
Index.