Glossary of Cyber Warfare, Cyber Crime and Cyber Security
Dan Remenyi,Richard L Wilson
Glossary of Cyber Warfare, Cyber Crime and Cyber Security
Dan Remenyi,Richard L Wilson
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
There has always been some degree of controversy surrounding computers and computers have always been vulnerable. In the early days of computing there were cases of theft and criminal damage to new computer installations. Computers have been shot at and even bombed, causing extensive damage.
Over the years there have been many attempts at computer fraud. One of the most celebrated was the so-called Salami Fraud where small amounts of money, which would be hardly noticed by any individual, were taken from a very large number of bank accounts, thus enriching the fraudsters. However, these were largely limited to corporate situations where the damage was contained. With the arrival of the personal computer and especially mobile devices such as laptops and smart phones the damage achievable by fraudsters and vandals and others wishing to inflict damage on elements of cyberspace has grown and a considerable number of people have had a lot of money swindled from them. In a similar vein computers are now also used as weapons to target other computers and electronic devices.
The past 20 years has seen a massive escalation in the damage done in cyberspace and this has been accompanied by a growing concern about all aspects of Cyber Security. The ever increasing number of cyber attacks on individuals, organisations and national government agencies has reached epidemic proportions. It is not possible to know the exact extent of these attacks and the damage which they have done as no one wishes to advertise their vulnerability - even their past vulnerability. However, estimates suggest that the cost of these attacks have run into tens or even hundreds of billions of dollars. What is certain is that billions of dollars are being spent every year in order to improve cyber security.
This item is not currently in-stock. It can be ordered online and is expected to ship in 7-14 days
Our stock data is updated periodically, and availability may change throughout the day for in-demand items. Please call the relevant shop for the most current stock information. Prices are subject to change without notice.
Sign in or become a Readings Member to add this title to a wishlist.