Cybercrime and Information Technology: Theory and Practice--The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.
The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations--something the law is often slow to move on given the current speed in which technology advances.
Key Features:
- Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
- Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
- Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
- Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.
Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.
A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction.
About the Author: Dr. Alex Alexandrou is an Assistant Professor at the Department of Security, Fire, and Emergency Management at John Jay College. He received his doctoral degree in computing studies from Pace University. Since 2005, he has been teaching computer and health informatics and telehealth courses at Pace University and the Fashion Institute of Technology (FIT). He has also produced and directed twelve episodes of a PBS talk show broadcasted on WNET, WNYC and CUNY-TV.
Dr. Alexandrou has worked extensively in both business and academic environments. He has over 18 years of professional experience in healthcare IT, including software integration, biometric and access control systems, deploying virtualization by transitioned use of physical servers into virtualization technology, realigning IT architecture with cloud-based networks and security platforms/technologies.
In addition, he has worked extensively with Agile/Scrum methodologies used for managing projects and software development and ensuring compliance with legal regulations such as the Health Insurance Portability and Accountability Act (HIPPA) and the Health Information Technology for Economic and Clinical Health (HITECK) Act.
Academically, he has conducted research studies on biometric authentication, electronic medical records, and mobile devices security and perception in the healthcare environment.
His current research interests include mobile forensics investigation, mobile devices vulnerabilities and threats, wireless networking and wireless vulnerabilities and exploits, security and privacy.