0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (30)
  • R500+ (304)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback): Stephen Timm At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback)
Stephen Timm
R385 R361 Discovery Miles 3 610 Save R24 (6%) In Stock

Eran Eyal had it all: a trendy New York apartment, a jet-set lifestyle and investors lining up to get in on his million-dollar cryptocurrency start-up, Shopin. He had come a long way from an ordinary middle-class childhood in Durban and the burgeoning tech start-up world of Cape Town.

But the New York authorities pounced in 2018, charged him with fraud and packed him off to Rikers Island. There began the gobsmacking unravelling of a scam that spanned investors across the globe and revealed that Eyal had built a house of cards involving fictitious products, clients and advisors for Shopin and his previous company, Springleap. As more than $40 million went up in smoke, the South African entrepreneur was exposed as an audacious fraudster determined to succeed at any cost – even if it meant spinning a web of  lies to do so.

“An age-old narrative about ego and flying too close to the sun as well as a modern version of greed in the tech world.” Michael Jordaan

“Eyal proves definitively that a thousand white lies can get you convicted of fraud. This book meticulously walks the reader though the start-up lies that ended in tears.” Nic Haralambous

Binary Bullets - The Ethics of Cyberwarfare (Hardcover): Fritz Allhoff, Adam Henschke, Bradley Jay Strawser Binary Bullets - The Ethics of Cyberwarfare (Hardcover)
Fritz Allhoff, Adam Henschke, Bradley Jay Strawser
R3,644 Discovery Miles 36 440 Ships in 12 - 17 working days

Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain " of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.

An Introduction to Hacking and Crimeware - A Pocket Guide (Paperback): Victoria Loewengart An Introduction to Hacking and Crimeware - A Pocket Guide (Paperback)
Victoria Loewengart
R483 Discovery Miles 4 830 Ships in 12 - 17 working days

Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.

Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R564 R524 Discovery Miles 5 240 Save R40 (7%) Ships in 10 - 15 working days
Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed): Michele Slatalla Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed)
Michele Slatalla
R436 R405 Discovery Miles 4 050 Save R31 (7%) Ships in 10 - 15 working days

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

This Is How They Tell Me the World Ends - A True Story (Paperback): Nicole Perlroth This Is How They Tell Me the World Ends - A True Story (Paperback)
Nicole Perlroth
R331 R304 Discovery Miles 3 040 Save R27 (8%) Ships in 9 - 15 working days

WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying expose' The Times 'Part John le Carre . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable. Filled with spies, hackers, arms dealers and a few unsung heroes, This Is How They Tell Me the World Ends is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R614 Discovery Miles 6 140 Ships in 12 - 17 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover): Brian Innes Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover)
Brian Innes
R633 R571 Discovery Miles 5 710 Save R62 (10%) Ships in 9 - 15 working days

For as long as historical annals have been kept, they have recorded the frauds and fakes that have been imposed upon innocent dupes. Perhaps the earliest Christian story of all is that which tells of the deception that Jacob practised on his unsuspecting father Abraham, pretending to be his brother Esau; and today the theft of identity is reported to be the most rapidly spreading crime. And throughout the ages works of art and literature, coinage, and documents of all kinds have been forged for profit, personal status - and even out of pure mischief. Fakes, Scams and Forgeries details many of the most notorious acts of forgery, fraud and fakery that have taken place over the centuries, describing how they were perpetrated, their acceptance by those who considered themselves experts, and how - often after many years - they were eventually detected. As well as providing entertaining and in-depth profiles of famous forgers and legendary frauds, the text deals with the many modern scientific techniques that have been developed for the examination of suspect materials.

Managerial Guide for Handling Cyber-terrorism and Information Warfare (Hardcover, New): Lech J. Janczewski, Andrew Colarik Managerial Guide for Handling Cyber-terrorism and Information Warfare (Hardcover, New)
Lech J. Janczewski, Andrew Colarik
R2,369 Discovery Miles 23 690 Ships in 12 - 17 working days

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. ""Managerial Guide for Handling Cyber-Terrorism and Information Warfare"" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

Computer and Intrusion Forensics (Hardcover): George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish Computer and Intrusion Forensics (Hardcover)
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish
R2,797 Discovery Miles 27 970 Ships in 10 - 15 working days

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

The Psychology of Cyber Crime - Concepts and Principles (Hardcover): Grainne Kirwan, Andrew Power The Psychology of Cyber Crime - Concepts and Principles (Hardcover)
Grainne Kirwan, Andrew Power
R5,293 Discovery Miles 52 930 Ships in 12 - 17 working days

As more individuals own and operate Internet-enabled devices and more critical government and industrial systems rely on advanced technologies, the issue of cybercrime has become a crucial concern for both the general public and professionals alike. The Psychology of Cyber Crime: Concepts and Principles aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures. It is designed as a source for researchers and practitioners in the disciplines of criminology, cyberpsychology, and forensic psychology, though it is also likely to be of significant interest to many students of information technology and other related disciplines.

Advances in Digital Forensics II (Hardcover, 2006 ed.): Martin S Olivier, Sujeet Shenoi Advances in Digital Forensics II (Hardcover, 2006 ed.)
Martin S Olivier, Sujeet Shenoi
R3,097 Discovery Miles 30 970 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance a" investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:

  • Themes and Issues in Digital Forensics
  • Evidence Collecting and Handling
  • Forensic Techniques
  • Operating System and File System Forensics
  • Network Forensics
  • Portable Electronic Device Forensics
  • Linux and File System Forensics
  • Training, Governance and Legal Issues

This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The bookcontains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006.

Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

For more information about IFIP, please visit www.ifip.org.

E-Commerce Security-Advice From Experts (Paperback, New): Khosrow-Pour E-Commerce Security-Advice From Experts (Paperback, New)
Khosrow-Pour
R942 R673 Discovery Miles 6 730 Save R269 (29%) Ships in 12 - 17 working days

The e-commerce revolution has allowed many organizations around the world to become more effective and efficient in managing their resources. Through the use of e-commerce many businesses can now cut the cost of doing business with their customers in a speed that could only be imagined a decade ago. However, doing business on the Internet has opened up business to additional vulnerabilities and misuse. It has been estimated that the cost of misuse and criminal activities related to e-commerce now exceeds 10 billion dollars per year, and many experts predict that this number will increase in the future. IT Solutions Series: E-Commerce Security: Advice from Experts provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and solutions.

From Anarchy to Power - The Net Comes of Age (Hardcover): Wendy Grossman From Anarchy to Power - The Net Comes of Age (Hardcover)
Wendy Grossman
R1,677 Discovery Miles 16 770 Ships in 10 - 15 working days

"Both newbies (newcomers to the Internet) and Netizens (old-timers) will find challenges and rewards in this witty, knowledgeable, and timely report from the electronic front."
--"Publishers Weekly"

"Vividly describes the virtual realm as a place of interconnecting communities every bitas complicated, exciting, and dangerous as any city."
--"Booklist"

"A pleasant antidote to the breathless rhetoric one finds in many books and magazines devoted to computer culture."
--"Technology Review"

"Grossman brings a wealth of professional and personal experience to the material-and a clarity of style and analysis that is a welcome relief from both the hyperbolic prose of many Net boosters and the overwrought jeremiads of cyberphobes."
--"Reason"

"There is a lot to like about this survey, especially the diligent research and reading the author has invested in it. The endnotes are vast and informative..."From Anarchy to Power" gathers strengh as it goes along."
--"The Christian Century"

"An informative exploration into many of the issues and problems that plague the Net today...From Anarchy to Power is a must read."
-- "ComputerUser.com"

companion website: http: //www.nyupress.org/fap

Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure.

In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture?

We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading.

There's a War Going On But No One Can See It (Paperback): Huib Modderkolk There's a War Going On But No One Can See It (Paperback)
Huib Modderkolk
R291 R264 Discovery Miles 2 640 Save R27 (9%) Ships in 9 - 15 working days

'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.

Hacking Point of Sale - Payment Application Secrets, Threats, and Solutions (Paperback): S Gomzin Hacking Point of Sale - Payment Application Secrets, Threats, and Solutions (Paperback)
S Gomzin
R1,379 Discovery Miles 13 790 Ships in 9 - 15 working days

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. "Hacking Point of Sale" is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to applicationExplores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISOExplains how protected areas are hacked and how hackers spot vulnerabilitiesProposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code

"Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions" is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition)
Branden Williams, James Adamson
R1,337 Discovery Miles 13 370 Ships in 12 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Paperback): Lev Topor Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Paperback)
Lev Topor
R1,122 Discovery Miles 11 220 Ships in 9 - 15 working days

Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web. It unveils how hatred and conspiracies spread and thrive online and how white supremacy is becoming prominent as extremists find shelter in the online dank underbelly of society. Phishing for Nazis explains how online manifestations of hate radicalize people into taking "real-world" action, such as shooting sprees. Methodologically, this book is unique, as it incorporates undercover cyberethnography, a method frequently used by law enforcement and intelligence agencies, unlike traditional academic studies of racism or social behavior that rely on secondary sources or surveys. With a particular interest on how race issues translate online, the book presents the true phenomenon of racism without relying on political correctness or whitewashing. It contributes to the field of cyber communication, as it details why and how people communicate and manage entire communities without knowing one another. The book also contributes to public policy, regulators, and technology companies as they deal with the practice of online anonymity and extremism.

The Evolution of Law against Payment Frauds (Paperback): Christopher Chen The Evolution of Law against Payment Frauds (Paperback)
Christopher Chen
R1,185 Discovery Miles 11 850 Ships in 9 - 15 working days

This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing payment systems ('payment fraud', e.g. forged cheques, wrongful payment instructions, etc.) in Asia, focusing on laws in Greater China and Singapore. In the past century, the payment system has invited much innovation, changing the modes of payments from exchanging cash and coins to the use of cards, wire transfers and other new types of payment instruments or services (e.g. bitcoins or QR code payments). As the nature of payment services is to move money from one place to another, it naturally attracts fraudsters. Even with advanced computer technology, payment fraud is still rampant in the market, causing billions of dollars in losses globally per annum. Through an examination of payment instruments and associated frauds over time, the book illustrates a shifting trend of legal solutions from criminal sanctions and civil compensation to a gradual focus on regulations of payment intermediaries. This trend reflects the complexity of payment systems and the challenge of protecting them. The book also identifies the underlying actors and institutional characteristics driving the evolution of legal institutions to deal with payment fraud and illustrates how the arrival of new technology may affect the market and thus the evolution of legal institutions. The book will help readers to better understand the interaction between technology, the market and law and help regulators, financial institutions, practitioners and end users, as well as about payment fraud and corresponding legal responses.

What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback): Shimon... What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback)
Shimon Brathwaite
R1,237 Discovery Miles 12 370 Ships in 9 - 15 working days

1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses

Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover): Sunita Vikrant Dhavale Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover)
Sunita Vikrant Dhavale
R4,738 Discovery Miles 47 380 Ships in 12 - 17 working days
Cybersecurity for Beginners (Hardcover, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Hardcover, 2nd Revised edition)
Raef Meeuwisse
R693 Discovery Miles 6 930 Ships in 12 - 17 working days
Economic Crime - From Conception to Response (Paperback): Mark Button, Branislav Hock, David Shepherd Economic Crime - From Conception to Response (Paperback)
Mark Button, Branislav Hock, David Shepherd
R1,205 Discovery Miles 12 050 Ships in 9 - 15 working days

This book offers a fresh approach to a range of pressing issues, emphasising the value of establishing economic crime as a sub-discipline within criminology. This will be essential reading for a range of more applied graduate courses across the UK and Europe on counter-fraud, money laundering, corruption, security management and financial crime investigation. Given the prominence of 'economic crime' amongst police forces, law enforcement agencies and government, this book has a secondary market amongst practitioners.

Bit By Bit (Large print, Hardcover, Large type / large print edition): Hanley Bit By Bit (Large print, Hardcover, Large type / large print edition)
Hanley; Edited by Christine A. Adams
R1,070 R931 Discovery Miles 9 310 Save R139 (13%) Ships in 10 - 15 working days
Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Paperback): Andrew A. Bochman,... Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Paperback)
Andrew A. Bochman, Sarah Freeman
R1,052 Discovery Miles 10 520 Ships in 9 - 15 working days

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lifespace Replacement Hinged Kettle…
R700 R519 Discovery Miles 5 190
Braai Metal Rectangular - 60cm X 32cm
R467 Discovery Miles 4 670
Lifespace Jalapeno Chilli Popper or…
R350 R219 Discovery Miles 2 190
CRYMACHINA: Deluxe Edition
R1,558 R1,078 Discovery Miles 10 780
Middle-Earth: Shadow of War
R145 Discovery Miles 1 450
LEGO Batman 3: Beyond Gotham
Blu-ray disc R364 Discovery Miles 3 640
LK's Hinged Kettle Braai Grid (57cm…
R584 Discovery Miles 5 840
Kaufmann Chicken Roaster (Single)
R121 Discovery Miles 1 210
Pokémon Shield
 (1)
R1,299 R1,093 Discovery Miles 10 930
Lifespace "Upper Deck" Grid Extension…
R500 R279 Discovery Miles 2 790

 

Partners