Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

· CRC Press
Ebook
454
Pages
Eligible
Ratings and reviews aren’t verified  Learn More

About this ebook

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.

While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.

The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances.

Key Features:

  • Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
  • Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
  • Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
  • Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.

Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.

A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction.

About the author

Dr. Alex Alexandrou is an Assistant Professor at the Department of Security, Fire, and Emergency Management at John Jay College. He received his doctoral degree in computing studies from Pace University. Since 2005, he has been teaching computer and health informatics and telehealth courses at Pace University and the Fashion Institute of Technology (FIT). He has also produced and directed twelve episodes of a PBS talk show broadcasted on WNET, WNYC and CUNY-TV.

Dr. Alexandrou has worked extensively in both business and academic environments. He has over 18 years of professional experience in healthcare IT, including software integration, biometric and access control systems, deploying virtualization by transitioned use of physical servers into virtualization technology, realigning IT architecture with cloud-based networks and security platforms/technologies.

In addition, he has worked extensively with Agile/Scrum methodologies used for managing projects and software development and ensuring compliance with legal regulations such as the Health Insurance Portability and Accountability Act (HIPPA) and the Health Information Technology for Economic and Clinical Health (HITECK) Act.

Academically, he has conducted research studies on biometric authentication, electronic medical records, and mobile devices security and perception in the healthcare environment.

His current research interests include mobile forensics investigation, mobile devices vulnerabilities and threats, wireless networking and wireless vulnerabilities and exploits, security and privacy.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.