Within the past four years, cyber crime has evolved from a minor nuisance to a major concern involving well-organised actors and highly sophisticated organisations. This volume explores the state of threats present in the cyber fraud underground.
Within the past four years, cyber crime has evolved from a minor nuisance to a major concern involving well-organised actors and highly sophisticated ...
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.
To accomplish this, the team of security professionals from VeriSign's iDefense(R) Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to...
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demysti...