| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910665418903321 |
|
|
Autore |
Akhgar Babak |
|
|
Titolo |
Cyber crime and cyber terrorism investigator's handbook / / edited by Babak Akhgar, Andrew Staniforth, Francesca Bosco ; acquiring editor, Steve Elliot ; editorial project manager, Benjamin Rearick ; project manager, Priya Kumaraguruparan ; designer, Mark Rogers |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Waltham, Massachusetts : , : Syngress, an imprint of Elsevier, , [2014] |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxiii, 282 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
Special needs offenders closeup |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer crimes - Investigation |
Cyberterrorism - Investigation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Cyber Crime and Cyber Terrorism Investigator's Handbook; Copyright; Acknowledgments; Endorsements; Contents; Contributors; Author Biography; Foreword; Preface; Chapter 1: Cyberspace: The new frontier for policing? ; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?; Conclusions; References; Chapter 3: New and emerging threats of cyber crime and terrorism; Introduction |
Some Historic MilestonesCyber security lessons not learned from previous ICT innovation cycles; Organizational aspects not learned from previous ICT innovation cycles; Emerging threats; Conclusions; References; Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes ; Introduction; Investigative Decision Making; Investigative Problem Solving; Developing Investigative Hypothesis; Investigative Innovation; Investigators Contact Management; Investigating Crime and Terror; Conclusion; References |
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigationsIntroduction; User Requirements and the Need for a User-Centered Approach?; Balancing Technological and |
|
|
|
|
|
|
|
|
|
|
|
Human Capabilities; Conducting User Requirements Elicitation; Capturing and Communicating User Requirements; Conclusion; Acknowledgment; References; Chapter 6: High-tech investigations of cyber crime; Introduction; High-Tech Investigations and Forensics; Core Concepts of High-Tech Investigations; Digital Landscapes; The "Crime Scene"; Live and Online Data Capture; Offline (Dead) Data Capture |
Verification of the DataReviewing the Requirements; Starting the Analysis; Signature Analysis; Filtering Evidence; Keyword Searching; Core Evidence; Windows LNK Files; Windows Prefetch Files; Windows Event Logs; Windows Registry; Restore Points; Case Study; Summary; References; Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines ; Introduction; Establishing Crime; Collecting Evidence for a Search Warrant; Reported by a Third Party; Identification of a Suspects Internet Protocol Address; IP Spoofing; Anonymizing Proxy Relay Services |
Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders |
Recovering Deleted Partitions |
|
|
|
|
|
|
Sommario/riassunto |
|
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910828389703321 |
|
|
Autore |
Enz Cathy A. <1956-, > |
|
|
Titolo |
Achieving success through innovation : cases and insights from the hospitality, travel, and tourism industry / / Cathy A. Enz [et al.] ; edited by Glenn Withiam |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York : , : Business Expert Press, , 2016 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[First edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (x, 200 pages) |
|
|
|
|
|
|
Collana |
|
Service systems and innovations in business and society collection, , 2326-2699 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Hospitality industry - Management |
Tourism - Management |
Technological innovations |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
1. The nature of innovation -- 2. Improving the customer experience -- 3. Better human resources for improved operations -- 4. Sustainability innovation -- 5. Applying technology for corporate success -- 6. Innovative restaurant concepts -- 7. Lodging concept innovation -- 8. Strategic intermediation -- 9. Achieving success through innovation -- About the authors -- Index. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book investigates the genesis and success of innovation in the hospitality industry as detailed in over four dozen case studies. In many of the cases, the innovators themselves provide the insights into their innovative inspiration and the lessons learned from the way they brought their ideas to life. The cases include innovations for improved customer service, stronger human resources, and new food service and lodging concepts. While updated technology forms the basis for many of the innovations, some of the cases focus specifically on technology improvements, with a particular focus on the use of technology as a mediator in the service value chain. With the passage of several years, the book shares the outcome of the innovative concepts--most of which continue to operate. The lessons presented will provide you a valuable perspective on success through innovation, whether you are operating in the hospitality industry or another business. |
|
|
|
|
|
|
|
| |