We use cookies to provide essential features and services. By using our website you agree to our use of cookies .


Warehouse Stock Clearance Sale

Grab a bargain today!

Cybercrime and Information Technology


Product Description
Product Details

Table of Contents

1: Understanding Essential Computer Concepts 2: Cybercrime in Data-Driven and Techno-Centric Society 3: Understanding the U.S. Legal System 4: Laws, Standards, and Regulations Affecting Cybercrime 5: The Networking Environment 6: Computer Security Technology and Principles 7: Internet of Things (IoTs) 8: Mobile Devices: The Smartphone

About the Author

Dr. Alex Alexandrou is an Assistant Professor at the Department of Security, Fire, and Emergency Management at John Jay College. He received his doctoral degree in computing studies from Pace University. Since 2005, he has been teaching computer and health informatics and telehealth courses at Pace University and the Fashion Institute of Technology (FIT). He has also produced and directed twelve episodes of a PBS talk show broadcasted on WNET, WNYC and CUNY-TV.Dr. Alexandrou has worked extensively in both business and academic environments. He has over 18 years of professional experience in healthcare IT, including software integration, biometric and access control systems, deploying virtualization by transitioned use of physical servers into virtualization technology, realigning IT architecture with cloud-based networks and security platforms/technologies. In addition, he has worked extensively with Agile/Scrum methodologies used for managing projects and software development and ensuring compliance with legal regulations such as the Health Insurance Portability and Accountability Act (HIPPA) and the Health Information Technology for Economic and Clinical Health (HITECK) Act.Academically, he has conducted research studies on biometric authentication, electronic medical records, and mobile devices security and perception in the healthcare environment. His current research interests include mobile forensics investigation, mobile devices vulnerabilities and threats, wireless networking and wireless vulnerabilities and exploits, security and privacy.

Ask a Question About this Product More...
Look for similar items by category
Home » Books » Computers » Security » Networking
Home » Books » Nonfiction » True Crime » General
Home » Books » Nonfiction » Law » Criminal Law
Item ships from and is sold by Fishpond.com, Inc.
Back to top