Description |
1 online resource : illustrations (some color), color maps |
Contents |
Introduction -- 'Good guy' perspectives on security -- Touching upon security controls of cyber Criminals -- A multidisciplinary approach for deviant security -- What? -- Basic qualities of deviant security -- Who? -- Interactive qualities of deviant security -- When & where? -- Temporal-spatial qualities of deviant security -- Investigative responses against deviant security -- The outlook of deviant security |
Summary |
"In this book academic and police officer Erik van de Sandt researches the security practices of cyber criminals. While their protective practices are not necessarily deemed criminal by law, the countermeasures of cyber criminals frequently deviate from prescribed bona fide cyber security standards. This book is the first to present a full picture on these deviant security practices, based on unique access to confidential police sources related to some of the world's most serious and organized cyber criminals. The findings of this socio-technical-legal research prove that deviant security is an academic field of study on its own, and will help a non-technical audience to understand cyber security and the challenges of investigating cyber crime"-- Provided by publisher |
Notes |
Based on author's thesis (doctoral - University of Bristol, 2019) issued under title: Deviant security : the technical computer security practices of cyber criminals |
Bibliography |
Includes bibliographical references and index |
Notes |
Description based on online resource; title from digital title page (viewed on September 23, 2021) |
Subject |
Computer crimes.
|
|
Computer security.
|
|
Criminology.
|
|
criminology.
|
|
Computer crimes
|
|
Computer security
|
|
Criminology
|
Form |
Electronic book
|
LC no. |
2021021509 |
ISBN |
9004463186 |
|
9789004463189 |
|