The subject of this work is the ways of committing criminal acts using information technologies, which requires finding adequate protection mechanisms in the phase of gathering, recording, exchanging and delivering data on security incidents. This book points out the importance of executive actions using information technologies. It should primarily serve managers in the security system to be innovative and capable of performing all security tasks, and rapid decision-making, where the application of information technologies enables the efficient and effective exchange of information and knowledge in different strategic, tactical and operational situations.