Information Risk and Security: Preventing and Investigating Workplace Computer Crime
Autor Edward Wildingen Limba Engleză Paperback – 23 aug 2018
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 328.00 lei 6-8 săpt. | |
Taylor & Francis – 23 aug 2018 | 328.00 lei 6-8 săpt. | |
Hardback (1) | 759.80 lei 6-8 săpt. | |
Taylor & Francis – 24 apr 2006 | 759.80 lei 6-8 săpt. |
Preț: 328.00 lei
Preț vechi: 373.99 lei
-12% Nou
Puncte Express: 492
Preț estimativ în valută:
62.77€ • 66.02$ • 52.45£
62.77€ • 66.02$ • 52.45£
Carte tipărită la comandă
Livrare economică 09-23 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781138380967
ISBN-10: 1138380962
Pagini: 362
Dimensiuni: 174 x 246 mm
Greutate: 0.67 kg
Ediția:1
Editura: Taylor & Francis
Colecția Routledge
Locul publicării:Oxford, United Kingdom
ISBN-10: 1138380962
Pagini: 362
Dimensiuni: 174 x 246 mm
Greutate: 0.67 kg
Ediția:1
Editura: Taylor & Francis
Colecția Routledge
Locul publicării:Oxford, United Kingdom
Public țintă
Professional Practice & DevelopmentCuprins
Contents: Introduction; Perception of risk; Computer fraud; Espionage, intellectual property theft and leaks; Password misuse; Trash risk; Wireless risks; Sabotage, extortion and blackmail; Social engineering; Risks with personal computers; Pornography; Anonymous letters; Press leaks; Incident response; Ground rules on computer evidence; Covert operations; Analytical modes; Investigative resources; Computer evidence in court; Exit procedures; Conclusion; Appendices; Glossary; Index.
Notă biografică
Edward Wilding has investigated several hundred cases of computer fraud and misuse in many jurisdictions. His previous book, Computer Evidence: A Forensic Investigations Handbook (Sweet and Maxwell 1996) was one of the first to discuss computer forensic investigations. The author has lectured widely, trained incident response teams, and conducted security and risk reviews for a diversity of clients. He has also served as an expert witness in civil and criminal cases, tribunals and official hearings, including the Hutton Inquiry. In 2002, he co-founded Data Genetics International (DGI), specializing in computer crime investigation, incident response and forensic evidence.
Recenzii
Edward Wilding, a renowned expert in computer forensics, explores, often in excruciating detail, the degree of risk that employees pose to their employer. From IT fraud, espionage, extortion and wireless interception to press leaks, anonymous letters and pornography. Wilding is unrelenting in his determination to catalogue every potential workplace crime and transgression...This book offers a highly valuable exploration of the reasons why businesses continue to suffer damaging security breaches, and the ways in which these can be prevented.' - Information Age 'In this tour de force of a publication, Edward Wilding guides readers through a maze of issues and solutions with clarity and conviction. The book is a 'must read' for every CIO.' - Information Security Specialist Group Magazine 'Many books on risk management and crisis management have similar aims; the prevention and detection of computer misuse. However, whilst many resort to simple checklists and promulgating nightmare scenarios that may never happen, Wilding's approach is more subtle, being grounded in "real life" examples and case studies as well as photographs and illustrations. This is the major strength of this book. The case studies put the advice in context and help the reader to understand the magnitude of the problems. Some of the examples may make the reader wince with guilty recognition... Some of the examples are truly extraordinary...This volume will have a deservedly wide readership well beyond the risk managers, IT Consultants, auditors and Personnel Directors at which it is principally aimed. All those who need to understand the inner workings of information technology, and the risks involved in its use, will find this book invaluable. In particular, litigation lawyers will find it of assistance when considering evidential issues, and for defining exactly what questions to ask when instructing forensic computer experts...Those who actually implement the strategies suggested will undou
Descriere
Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to prevent these threats before they happen and to investigate them, if and when they do. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computer and information systems.