0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R100 - R250 (4)
  • R250 - R500 (36)
  • R500+ (308)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Permanent Record (Paperback): Edward Snowden Permanent Record (Paperback)
Edward Snowden 1
R368 Discovery Miles 3 680 Ships in 12 - 17 working days

Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R564 R479 Discovery Miles 4 790 Save R85 (15%) Ships in 10 - 15 working days
Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed): Michele Slatalla Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed)
Michele Slatalla
R436 R364 Discovery Miles 3 640 Save R72 (17%) Ships in 10 - 15 working days

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021): Mark Stamp, Mamoun Alazab, Andrii... Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021)
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
R4,951 Discovery Miles 49 510 Ships in 12 - 17 working days

This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Game Over Girl (Paperback): Naomi Gibson Game Over Girl (Paperback)
Naomi Gibson
R202 Discovery Miles 2 020 Ships in 12 - 17 working days

An edge-of-your-seat psychological thriller from the acclaimed author of Every Line of You - A Good Girl's Guide to Murder meets virtual reality ... 'A pacy, intelligent novel that will have readers racing to get to the final page.' THE BOOKSELLER 'A pixelated whirlwind of a ride through the darkest secrets of the human mind, explored through the lens of virtual reality gaming!' LEE NEWBERY, AUTHOR OF THE LAST FIREFOX Lola's been selected to play a new virtual reality game - Better Than Life. In her game, she's loved. Is beautiful. Can do whatever she wants. But she quickly breaks the one rule: not to recreate people or places from real life. She recreates her house and a boy she fancies. Soon she's skipping school to play. But Lola has secrets - dark ones that begin to surface inside her game - and the more she tries to fix her problems, the more she overlooks a much bigger threat ... An original, high-concept psychological thriller - Holly Jackson meets VR horror Set in an exclusive boarding school, this rollercoaster ride of a story involves an unreliable narrator,immersive gaming, a dark secret and a huge twist Perfect for fans of Cynthia Murphy and Kathryn Foxfield PRAISE FOR EVERY LINE OF YOU: 'What a debut. So tense - and it didn't lead where I thought it was going.' SUE WALLMAN, author of YOUR TURN TO DIE 'Frankenstein meets Heathers. Bonnie and Clyde for the digital age, Every Line of You is a gripping thriller about the power of AI and a fresh twist on the intensity of first love.' AMY MCCAW, author of MINA AND THE UNDEAD

The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R574 Discovery Miles 5 740 Ships in 12 - 17 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Hackers and Hacking - A Reference Handbook (Hardcover, New): Thomas J. Holt, Bernadette H Schell Hackers and Hacking - A Reference Handbook (Hardcover, New)
Thomas J. Holt, Bernadette H Schell
R2,236 R1,915 Discovery Miles 19 150 Save R321 (14%) Ships in 12 - 17 working days

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives

Data Science in Cybersecurity and Cyberthreat Intelligence (Hardcover, 1st ed. 2020): Leslie F Sikos, Kim-Kwang Raymond Choo Data Science in Cybersecurity and Cyberthreat Intelligence (Hardcover, 1st ed. 2020)
Leslie F Sikos, Kim-Kwang Raymond Choo
R4,897 Discovery Miles 48 970 Ships in 12 - 17 working days

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.

Hacking (Hardcover): Walter Spivak Hacking (Hardcover)
Walter Spivak
R901 Discovery Miles 9 010 Ships in 10 - 15 working days

In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker. Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran

Managerial Guide for Handling Cyber-terrorism and Information Warfare (Hardcover, New): Lech J. Janczewski, Andrew Colarik Managerial Guide for Handling Cyber-terrorism and Information Warfare (Hardcover, New)
Lech J. Janczewski, Andrew Colarik
R2,288 Discovery Miles 22 880 Ships in 12 - 17 working days

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. ""Managerial Guide for Handling Cyber-Terrorism and Information Warfare"" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

Security, Privacy and User Interaction (Hardcover, 1st ed. 2020): Markus Jakobsson Security, Privacy and User Interaction (Hardcover, 1st ed. 2020)
Markus Jakobsson
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Computer and Intrusion Forensics (Hardcover): George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish Computer and Intrusion Forensics (Hardcover)
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish
R2,717 Discovery Miles 27 170 Ships in 10 - 15 working days

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

Hacking the Code - Auditor's Guide to Writing Secure Code for the Web (Hardcover): Mark Burnett Hacking the Code - Auditor's Guide to Writing Secure Code for the Web (Hardcover)
Mark Burnett
R1,486 Discovery Miles 14 860 Ships in 12 - 17 working days

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book.
The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
* Learn to quickly create security tools that ease the burden of software testing and network administration
* Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development
* Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools
* Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications
* Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits

The Psychology of Cyber Crime - Concepts and Principles (Hardcover): Grainne Kirwan, Andrew Power The Psychology of Cyber Crime - Concepts and Principles (Hardcover)
Grainne Kirwan, Andrew Power
R5,570 R5,131 Discovery Miles 51 310 Save R439 (8%) Ships in 12 - 17 working days

As more individuals own and operate Internet-enabled devices and more critical government and industrial systems rely on advanced technologies, the issue of cybercrime has become a crucial concern for both the general public and professionals alike. The Psychology of Cyber Crime: Concepts and Principles aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures. It is designed as a source for researchers and practitioners in the disciplines of criminology, cyberpsychology, and forensic psychology, though it is also likely to be of significant interest to many students of information technology and other related disciplines.

Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Hardcover, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,554 Discovery Miles 15 540 Ships in 10 - 15 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Data Protection on the Move - Current Developments in ICT and Privacy/Data Protection (Hardcover, 1st ed. 2016): Serge... Data Protection on the Move - Current Developments in ICT and Privacy/Data Protection (Hardcover, 1st ed. 2016)
Serge Gutwirth, Ronald Leenes, Paul De Hert
R4,879 Discovery Miles 48 790 Ships in 12 - 17 working days

This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

The Hacking of America - Who's Doing It, Why, and How (Hardcover): Bernadette H Schell, John L. Dodge The Hacking of America - Who's Doing It, Why, and How (Hardcover)
Bernadette H Schell, John L. Dodge
R2,453 Discovery Miles 24 530 Ships in 10 - 15 working days

Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers. Many of the profiled are at the top of their game, revered by both the good hackers (white hats) and their more malevolent peers (black hats).

While there are serious reasons to fear the darker elements of the hacker community, there is also much to admire in their nobler counterparts. Fascinating case studies on hackers who have been caught and convicted of their crimes, as well as those betrayed by their peers, offer a unique, credible understanding of what makes hackers tick. The authors examine current laws meant to control hacking and its collateral crimes--stalking and terrorism--along with other means of reining in the irresponsible scriptkiddies and vicious black hats. Moderated and balanced, this book is an easy-to-read, authoritative source information for anyone interested in who hackers are, and how much we should worry about them.

This Is How They Tell Me the World Ends - A True Story (Paperback): Nicole Perlroth This Is How They Tell Me the World Ends - A True Story (Paperback)
Nicole Perlroth
R278 Discovery Miles 2 780 Ships in 12 - 17 working days

WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying expose' The Times 'Part John le Carre . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable. Filled with spies, hackers, arms dealers and a few unsung heroes, This Is How They Tell Me the World Ends is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R3,949 Discovery Miles 39 490 Ships in 12 - 17 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Advances in Digital Forensics II (Hardcover, 2006 ed.): Martin S Olivier, Sujeet Shenoi Advances in Digital Forensics II (Hardcover, 2006 ed.)
Martin S Olivier, Sujeet Shenoi
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance a" investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:

  • Themes and Issues in Digital Forensics
  • Evidence Collecting and Handling
  • Forensic Techniques
  • Operating System and File System Forensics
  • Network Forensics
  • Portable Electronic Device Forensics
  • Linux and File System Forensics
  • Training, Governance and Legal Issues

This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The bookcontains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006.

Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

For more information about IFIP, please visit www.ifip.org.

Information Security Technologies for Controlling Pandemics (Hardcover, 1st ed. 2021): Hamid Jahankhani, Stefan Kendzierskyj,... Information Security Technologies for Controlling Pandemics (Hardcover, 1st ed. 2021)
Hamid Jahankhani, Stefan Kendzierskyj, Babak Akhgar
R4,288 Discovery Miles 42 880 Ships in 12 - 17 working days

The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.

Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R2,829 Discovery Miles 28 290 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Cybersecurity for Beginners (Hardcover, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Hardcover, 2nd Revised edition)
Raef Meeuwisse
R657 Discovery Miles 6 570 Ships in 12 - 17 working days
E-Commerce Security-Advice From Experts (Paperback, New): Khosrow-Pour E-Commerce Security-Advice From Experts (Paperback, New)
Khosrow-Pour
R920 R637 Discovery Miles 6 370 Save R283 (31%) Ships in 12 - 17 working days

The e-commerce revolution has allowed many organizations around the world to become more effective and efficient in managing their resources. Through the use of e-commerce many businesses can now cut the cost of doing business with their customers in a speed that could only be imagined a decade ago. However, doing business on the Internet has opened up business to additional vulnerabilities and misuse. It has been estimated that the cost of misuse and criminal activities related to e-commerce now exceeds 10 billion dollars per year, and many experts predict that this number will increase in the future. IT Solutions Series: E-Commerce Security: Advice from Experts provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and solutions.

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,009 R884 Discovery Miles 8 840 Save R125 (12%) Ships in 9 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyber Denial, Deception and Counter…
Kristin E. Heckman, Frank J Stech, … Hardcover R3,505 R2,386 Discovery Miles 23 860
At Any Cost - The South African…
Stephen Timm Paperback R365 R45 Discovery Miles 450
Phishing for Nazis - Conspiracies…
Lev Topor Paperback R1,038 Discovery Miles 10 380
PCI Compliance - Understand and…
Branden Williams, James Adamson Paperback R1,312 R1,228 Discovery Miles 12 280
There's a War Going On But No One Can…
Huib Modderkolk Paperback R242 Discovery Miles 2 420
The Evolution of Law against Payment…
Christopher Chen Paperback R1,100 Discovery Miles 11 000
Hacking Point of Sale - Payment…
S Gomzin Paperback R1,338 Discovery Miles 13 380
What To Do When You Get Hacked - A…
Shimon Brathwaite Paperback R1,152 Discovery Miles 11 520
Cybersecurity Ethics - An Introduction
Mary Manjikian Paperback R1,053 Discovery Miles 10 530
Advanced Image-Based Spam Detection and…
Sunita Vikrant Dhavale Hardcover R4,590 Discovery Miles 45 900

 

Partners