
Cybercrime and Information Technology
The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
- 384 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cybercrime and Information Technology
The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
About this book
Cybercrime and Information Technology: Theory and PracticeāThe Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.
The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulationsāsomething the law is often slow to move on given the current speed in which technology advances.
Key Features:
- Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
- Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
- Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
- Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.
Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.
A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1 Understanding Essential Computer Concepts
Objectives
- Understand information processing in computing devices
- Explain the difference between a Bit and a Byte
- Understand Binary, Hexadecimal ASCII, EBCDIC, and UNICODE codes
- Understand Boolean algebra, logic gates, and truth tables
- Explain color depth, color models, and screen resolution
- Understand lossy and lossless compression
- Understand the basics of quantum computing
- Recognize computer terminology
- Understand the history of computers and the technology surrounding them
1.1 Understanding Computation
Conventional Computer Systems
Table of contents
- Cover
- Half-Title
- Title
- Copyright
- Dedication
- Contents
- Preface
- Acknowledgment
- Authorās Bio
- CHAPTER 1 Understanding Essential Computer Concepts
- CHAPTER 2 Cybercrime in a Data-Driven and Techno-Centric Society
- CHAPTER 3 Understanding the U.S. Legal System
- CHAPTER 4 Laws, Standards, and Regulations Affecting Cybercrime
- CHAPTER 5 The Networking Environment
- CHAPTER 6 Computer Security Technology and Principles
- CHAPTER 7 Internet of Things (IoTs)
- CHAPTER 8 Mobile Devices: The Smartphone
- Appendix A: A Complete Text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030.
- Appendix B: 17 U.S.C. § 1201 Circumvention of Copyright Protection Systems
- Appendix C: HIPAA §164.308 Administrative Safeguards
- Appendix D
- Appendix E: 15 U.S.C.
- Appendix F
- Appendix G
- Appendix H
- Appendix I: Valuable IT and Management Certifications
- Index