![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Eran Eyal had it all: a trendy New York apartment, a jet-set lifestyle
and investors lining up to get in on his million-dollar cryptocurrency
start-up, Shopin. He had come a long way from an ordinary middle-class
childhood in Durban and the burgeoning tech start-up world of Cape
Town.
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.
The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker. Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying expose' The Times 'Part John le Carre . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable. Filled with spies, hackers, arms dealers and a few unsung heroes, This Is How They Tell Me the World Ends is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
For as long as historical annals have been kept, they have recorded the frauds and fakes that have been imposed upon innocent dupes. Perhaps the earliest Christian story of all is that which tells of the deception that Jacob practised on his unsuspecting father Abraham, pretending to be his brother Esau; and today the theft of identity is reported to be the most rapidly spreading crime. And throughout the ages works of art and literature, coinage, and documents of all kinds have been forged for profit, personal status - and even out of pure mischief. Fakes, Scams and Forgeries details many of the most notorious acts of forgery, fraud and fakery that have taken place over the centuries, describing how they were perpetrated, their acceptance by those who considered themselves experts, and how - often after many years - they were eventually detected. As well as providing entertaining and in-depth profiles of famous forgers and legendary frauds, the text deals with the many modern scientific techniques that have been developed for the examination of suspect materials.
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. ""Managerial Guide for Handling Cyber-Terrorism and Information Warfare"" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.
As more individuals own and operate Internet-enabled devices and more critical government and industrial systems rely on advanced technologies, the issue of cybercrime has become a crucial concern for both the general public and professionals alike. The Psychology of Cyber Crime: Concepts and Principles aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures. It is designed as a source for researchers and practitioners in the disciplines of criminology, cyberpsychology, and forensic psychology, though it is also likely to be of significant interest to many students of information technology and other related disciplines.
Hacker Code will have over 400 pages of dedicated exploit,
vulnerability, and tool code with corresponding instruction. Unlike
other security and programming books that dedicate hundreds of
pages to architecture and theory based flaws and exploits, HC1 will
dive right into deep code analysis. Previously undisclosed security
research in combination with superior programming techniques from
Foundstone and other respected organizations will be included in
both the Local and Remote Code sections of the book.
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers. Many of the profiled are at the top of their game, revered by both the good hackers (white hats) and their more malevolent peers (black hats). While there are serious reasons to fear the darker elements of the hacker community, there is also much to admire in their nobler counterparts. Fascinating case studies on hackers who have been caught and convicted of their crimes, as well as those betrayed by their peers, offer a unique, credible understanding of what makes hackers tick. The authors examine current laws meant to control hacking and its collateral crimes--stalking and terrorism--along with other means of reining in the irresponsible scriptkiddies and vicious black hats. Moderated and balanced, this book is an easy-to-read, authoritative source information for anyone interested in who hackers are, and how much we should worry about them.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance a" investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:
This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The bookcontains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.
The e-commerce revolution has allowed many organizations around the world to become more effective and efficient in managing their resources. Through the use of e-commerce many businesses can now cut the cost of doing business with their customers in a speed that could only be imagined a decade ago. However, doing business on the Internet has opened up business to additional vulnerabilities and misuse. It has been estimated that the cost of misuse and criminal activities related to e-commerce now exceeds 10 billion dollars per year, and many experts predict that this number will increase in the future. IT Solutions Series: E-Commerce Security: Advice from Experts provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and solutions.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
"Both newbies (newcomers to the Internet) and Netizens (old-timers)
will find challenges and rewards in this witty, knowledgeable, and
timely report from the electronic front." "Vividly describes the virtual realm as a place of
interconnecting communities every bitas complicated, exciting, and
dangerous as any city." "A pleasant antidote to the breathless rhetoric one finds in
many books and magazines devoted to computer culture." "Grossman brings a wealth of professional and personal
experience to the material-and a clarity of style and analysis that
is a welcome relief from both the hyperbolic prose of many Net
boosters and the overwrought jeremiads of cyberphobes." "There is a lot to like about this survey, especially the
diligent research and reading the author has invested in it. The
endnotes are vast and informative..."From Anarchy to Power" gathers
strengh as it goes along." "An informative exploration into many of the issues and problems
that plague the Net today...From Anarchy to Power is a must
read." companion website: http: //www.nyupress.org/fap Yesterday's battles over internet turf were fought on the net itself: today's battles are fought in government committees, in Congress, on the stock exchange, and in the marketplace. What was once an experimental ground for electronic commerce is now the hottest part of our economic infrastructure. In From Anarchy to Power, Wendy Grossman explores the new dispensation on the net and tackles the questions that trouble every online user: How vulnerable are the internet andworld wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? Are women and minorities at a disadvantage in cyberspace? How is the increasing power of big business changing internet culture? We learn about the political economy of the internet including issues of copyright law, corporate control and cryptography legislation. Throughout the book the emphasis is on the international dimensions of the net, focusing on privacy and censorship in the United States, Europe and Canada and the hitherto ignored contributions of other countries in the development of the net. Entertaining and informative From Anarchy to Power is required reading for anyone who wants to know where the new digital economy is heading. |
![]() ![]() You may like...
Chemical Ecology in Aquatic Systems
Christer Broenmark, Lars-Anders Hansson
Hardcover
R4,679
Discovery Miles 46 790
Industrially Important Fungi for…
Ahmed M. Abdel-Azeem, Ajar Nath Yadav, …
Hardcover
R4,961
Discovery Miles 49 610
|