0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (31)
  • R500+ (314)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Handbook of Computer Crime Investigation - Forensic Tools and Technology (Paperback): Eoghan Casey Handbook of Computer Crime Investigation - Forensic Tools and Technology (Paperback)
Eoghan Casey
R1,659 Discovery Miles 16 590 Ships in 12 - 19 working days

Following on the success of his introductory text, "Digital Evidence and Computer Crime," Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.
The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool.
The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
The Tools section provides details of leading hardware and software
-
The main Technology section provides the technical "how to" information
-for collecting and analysing digital evidence in common situations
Case Examples give readers a sense of the technical, legal, and practical
-challenges that arise in real computer investigations

At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback): Stephen Timm At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback)
Stephen Timm
R385 R361 Discovery Miles 3 610 Save R24 (6%) In Stock

Eran Eyal had it all: a trendy New York apartment, a jet-set lifestyle and investors lining up to get in on his million-dollar cryptocurrency start-up, Shopin. He had come a long way from an ordinary middle-class childhood in Durban and the burgeoning tech start-up world of Cape Town.

But the New York authorities pounced in 2018, charged him with fraud and packed him off to Rikers Island. There began the gobsmacking unravelling of a scam that spanned investors across the globe and revealed that Eyal had built a house of cards involving fictitious products, clients and advisors for Shopin and his previous company, Springleap. As more than $40 million went up in smoke, the South African entrepreneur was exposed as an audacious fraudster determined to succeed at any cost – even if it meant spinning a web of  lies to do so.

“An age-old narrative about ego and flying too close to the sun as well as a modern version of greed in the tech world.” Michael Jordaan

“Eyal proves definitively that a thousand white lies can get you convicted of fraud. This book meticulously walks the reader though the start-up lies that ended in tears.” Nic Haralambous

An Introduction to Hacking and Crimeware - A Pocket Guide (Paperback): Victoria Loewengart An Introduction to Hacking and Crimeware - A Pocket Guide (Paperback)
Victoria Loewengart
R500 Discovery Miles 5 000 Ships in 12 - 19 working days

Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.

Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed): Michele Slatalla Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed)
Michele Slatalla
R480 R444 Discovery Miles 4 440 Save R36 (7%) Ships in 10 - 15 working days

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R564 R524 Discovery Miles 5 240 Save R40 (7%) Ships in 10 - 15 working days
The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R690 R636 Discovery Miles 6 360 Save R54 (8%) Ships in 12 - 19 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback): Eric Cole Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback)
Eric Cole
R1,176 Discovery Miles 11 760 Ships in 12 - 19 working days

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization" Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.

"Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.

Advanced Persistent Threat covers what you need to know including:

How and why organizations are being attacked

How to develop a "Risk based Approach to Security"

Tools for protecting data and preventing attacks

Critical information on how to respond and recover from an intrusion

The emerging threat to Cloud based networks "

The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback): Robert Bathurst, Russ Rogers, Alijohn... The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback)
Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
R1,038 R803 Discovery Miles 8 030 Save R235 (23%) Ships in 12 - 19 working days

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.

*Provides relevant information including some of the latest OS X threats

*Easily accessible to those without any prior OS X experience

*Useful tips and strategies for exploiting and compromising OS X systems

*Includes discussion of defensive and countermeasure applications and how to use them

*Covers mobile IOS vulnerabilities

Introduction to Cybercrime - Computer Crimes, Laws, and Policing in the 21st Century (Hardcover): Joshua B. Hill, Nancy E.... Introduction to Cybercrime - Computer Crimes, Laws, and Policing in the 21st Century (Hardcover)
Joshua B. Hill, Nancy E. Marion
R2,523 Discovery Miles 25 230 Ships in 10 - 15 working days

Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local. As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity-from copyright infringement to phishing to online pornography-has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts-if any-could deter cybercrime in the highly networked and extremely fast-moving modern world? Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century seeks to address this tough question and enables readers to better contextualize the place of cybercrime in the current landscape. This textbook documents how a significant side effect of the positive growth of technology has been a proliferation of computer-facilitated crime, explaining how computers have become the preferred tools used to commit crimes, both domestically and internationally, and have the potential to seriously harm people and property alike. The chapters discuss different types of cybercrimes-including new offenses unique to the Internet-and their widespread impacts. Readers will learn about the governmental responses worldwide that attempt to alleviate or prevent cybercrimes and gain a solid understanding of the issues surrounding cybercrime in today's society as well as the long- and short-term impacts of cybercrime. Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics Supplies examinations of both the domestic and international efforts to combat cybercrime Serves an ideal text for first-year undergraduate students in criminal justice programs

Seven Deadliest Web Application Attacks (Paperback): Mike Shema Seven Deadliest Web Application Attacks (Paperback)
Mike Shema
R609 Discovery Miles 6 090 Ships in 12 - 19 working days

Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered. This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers.

Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021): Mark Stamp, Mamoun Alazab, Andrii... Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021)
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
R5,226 Discovery Miles 52 260 Ships in 10 - 15 working days

This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Hackers and Hacking - A Reference Handbook (Hardcover, New): Thomas J. Holt, Bernadette H Schell Hackers and Hacking - A Reference Handbook (Hardcover, New)
Thomas J. Holt, Bernadette H Schell
R1,995 Discovery Miles 19 950 Ships in 10 - 15 working days

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives

No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback): Johnny Long No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback)
Johnny Long; Series edited by Kevin D. Mitnick
R1,057 R881 Discovery Miles 8 810 Save R176 (17%) Ships in 12 - 19 working days

As the cliche reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.
As you browse this book, you'll hear old familiar terms like "dumpster diving," "social engineering," and "shoulder surfing." Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big boldletters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Data Science in Cybersecurity and Cyberthreat Intelligence (Hardcover, 1st ed. 2020): Leslie F Sikos, Kim-Kwang Raymond Choo Data Science in Cybersecurity and Cyberthreat Intelligence (Hardcover, 1st ed. 2020)
Leslie F Sikos, Kim-Kwang Raymond Choo
R5,262 Discovery Miles 52 620 Ships in 12 - 19 working days

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.

Hacking (Hardcover): Walter Spivak Hacking (Hardcover)
Walter Spivak
R939 Discovery Miles 9 390 Ships in 10 - 15 working days

In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker. Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran

Managerial Guide for Handling Cyber-terrorism and Information Warfare (Hardcover, New): Lech J. Janczewski, Andrew Colarik Managerial Guide for Handling Cyber-terrorism and Information Warfare (Hardcover, New)
Lech J. Janczewski, Andrew Colarik
R2,417 Discovery Miles 24 170 Ships in 10 - 15 working days

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. ""Managerial Guide for Handling Cyber-Terrorism and Information Warfare"" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

Security, Privacy and User Interaction (Hardcover, 1st ed. 2020): Markus Jakobsson Security, Privacy and User Interaction (Hardcover, 1st ed. 2020)
Markus Jakobsson
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Computer and Intrusion Forensics (Hardcover): George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish Computer and Intrusion Forensics (Hardcover)
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish
R2,797 Discovery Miles 27 970 Ships in 10 - 15 working days

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

The Psychology of Cyber Crime - Concepts and Principles (Hardcover): Grainne Kirwan, Andrew Power The Psychology of Cyber Crime - Concepts and Principles (Hardcover)
Grainne Kirwan, Andrew Power
R5,335 Discovery Miles 53 350 Ships in 10 - 15 working days

As more individuals own and operate Internet-enabled devices and more critical government and industrial systems rely on advanced technologies, the issue of cybercrime has become a crucial concern for both the general public and professionals alike. The Psychology of Cyber Crime: Concepts and Principles aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures. It is designed as a source for researchers and practitioners in the disciplines of criminology, cyberpsychology, and forensic psychology, though it is also likely to be of significant interest to many students of information technology and other related disciplines.

Data Protection on the Move - Current Developments in ICT and Privacy/Data Protection (Hardcover, 1st ed. 2016): Serge... Data Protection on the Move - Current Developments in ICT and Privacy/Data Protection (Hardcover, 1st ed. 2016)
Serge Gutwirth, Ronald Leenes, Paul De Hert
R5,211 Discovery Miles 52 110 Ships in 12 - 19 working days

This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Hardcover, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,607 Discovery Miles 16 070 Ships in 10 - 15 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Low Tech Hacking - Street Smarts for Security Professionals (Paperback): Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ... Low Tech Hacking - Street Smarts for Security Professionals (Paperback)
Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
R1,048 R912 Discovery Miles 9 120 Save R136 (13%) Ships in 12 - 19 working days

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

The Hacking of America - Who's Doing It, Why, and How (Hardcover): Bernadette H Schell, John L. Dodge The Hacking of America - Who's Doing It, Why, and How (Hardcover)
Bernadette H Schell, John L. Dodge
R2,529 Discovery Miles 25 290 Ships in 10 - 15 working days

Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers. Many of the profiled are at the top of their game, revered by both the good hackers (white hats) and their more malevolent peers (black hats).

While there are serious reasons to fear the darker elements of the hacker community, there is also much to admire in their nobler counterparts. Fascinating case studies on hackers who have been caught and convicted of their crimes, as well as those betrayed by their peers, offer a unique, credible understanding of what makes hackers tick. The authors examine current laws meant to control hacking and its collateral crimes--stalking and terrorism--along with other means of reining in the irresponsible scriptkiddies and vicious black hats. Moderated and balanced, this book is an easy-to-read, authoritative source information for anyone interested in who hackers are, and how much we should worry about them.

XBOX 360 Forensics - A Digital Forensics Guide to Examining Artifacts (Paperback): Steven Bolt XBOX 360 Forensics - A Digital Forensics Guide to Examining Artifacts (Paperback)
Steven Bolt
R1,209 Discovery Miles 12 090 Ships in 12 - 19 working days

XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console - it streams movies, connects with social networking sites and chatrooms, transfer files, and more - it just may contain evidence to assist in your next criminal investigation. The digital forensics community has already begun to receive game consoles for examination, but there is currently no map for you to follow as there may be with other digital media. XBOX 360 Forensics provides that map and presents the information in an easy-to-read, easy-to-reference format. This book is organized into 11 chapters that cover topics such as Xbox 360 hardware; XBOX LIVE; configuration of the console; initial forensic acquisition and examination; specific file types for Xbox 360; Xbox 360 hard drive; post-system update drive artifacts; and XBOX Live redemption code and Facebook. This book will appeal to computer forensic and incident response professionals, including those in federal government, commercial/private sector contractors, and consultants.

Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques (Paperback): Thomas Wilhelm, Jason Andress Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques (Paperback)
Thomas Wilhelm, Jason Andress
R825 Discovery Miles 8 250 Ships in 12 - 19 working days

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Timing Optimization Through Clock Skew…
Ivan S. Kourtev, Eby G. Friedman, … Hardcover R2,996 Discovery Miles 29 960
Analog Circuit Design - Operational…
Johan Huijsing, Rudy J. van der Plassche, … Hardcover R5,846 Discovery Miles 58 460
VLSI Design and Test for Systems…
Shojiro Asai Hardcover R6,506 Discovery Miles 65 060
Advances in Intelligent Computing
J K Mandal, Paramartha Dutta, … Hardcover R3,365 Discovery Miles 33 650
IP Routing Protocols - Fundamentals and…
James Aweya Hardcover R5,530 Discovery Miles 55 300
Internet of Things - Frameworks for…
Sudhir Kumar Sharma, Bhuvan Unhelkar, … Hardcover R3,591 Discovery Miles 35 910
Architecture and CAD for Deep-Submicron…
Vaughn Betz, Jonathan Rose, … Hardcover R5,726 Discovery Miles 57 260
Place Coding in Analog VLSI - A…
Oliver Landolt Hardcover R4,477 Discovery Miles 44 770
Policies and Research in Identity…
Elisabeth De Leeuw, Simone Fischer-Hubner, … Hardcover R1,515 Discovery Miles 15 150
Physical Design and Mask Synthesis for…
Seongbo Shim, Youngsoo Shin Hardcover R3,444 Discovery Miles 34 440

 

Partners