Table of contents : Cover Half Title Title Page Copyright Page Table of Contents Preface Acknowledgment Author’s Bio Chapter 1 Understanding Essential Computer Concepts Objectives 1.1 Understanding Computation Conventional Computer Systems 1.2 Input Understanding Binary Data Conversion from Binary to Decimal Conversion from Decimal to Binary Hexadecimal Converting from Hexadecimal to Binary Conversion from Binary to Hexadecimal ASCII, EBCDIC and UNICODE 1.3 Processing Boolean Algebra, Logic Gates, and Truth Tables Processor Types (32-bit Processors vs 64-bit Processors) 1.4 Storage Compression Lossy Compression Lossless Compression 1.5 Output Pixels Color Depth Color Models Screen Resolution 1.6 Beyond Conventional Computing Quantum Computing Is Poised to Change Everything 1.7 A Brief History of Computing Devices 1.8 Conclusion 1.9 Key Words Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society Objectives 2.1 Cybercrime and the Cybercriminal 2.2 The Origin and Definition of Cybercrime – It’s the Data, Always the Data 2.3 Brief Summary of the Phases and Evolution of Cybercrime Phase I Phase II Phase III Phase IV 2.4 Cybercrime Categories The Three Cybercrime Categories 2.5 The Future of Cybercrime The Making of the Cybercriminal Cybercrime and the Internet of Things (IoT) Cybercrime: Machine Learning and Artificial Intelligence Online Child Sexual Abuse and Exploitation (CSAE) Cost of Cybercrime The Role of Cryptocurrency in Cybercrime State-Sponsored Cyberwarfare and Industrial Espionage 2.6 Conclusion 2.7 Key Words Chapter 3 Understanding the U.S.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |