0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (29)
  • R500+ (297)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Hardcover): Andreas Marklund, Laura... Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Hardcover)
Andreas Marklund, Laura Skouvig
R4,495 Discovery Miles 44 950 Ships in 10 - 15 working days

Deploying empirical studies spanning from early Imperial China to the present day, 17 scholars from across the globe explore the history of surveillance with special attention to the mechanisms of power that impel the concept of surveillance in society. By delving into a broad range of historical periods and contexts, the book sheds new light on surveillance as a societal phenomenon, offering 10 in-depth, applied analyses that revolve around two main questions: * Who are the central actors in the history of surveillance? * What kinds of phenomena have been deemed eligible for surveillance, for example, information flows, political movements, border-crossing trade, interacting with foreign states, workplace relations, gender relations, andsexuality?

Rhetoric of InSecurity - The Language of Danger, Fear and Safety in National and International Contexts (Hardcover): Victoria... Rhetoric of InSecurity - The Language of Danger, Fear and Safety in National and International Contexts (Hardcover)
Victoria Baines
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

This book demands that we question what we are told about security, using tools we have had for thousands of years. The work considers the history of security rhetoric in a number of distinct but related contexts, including the United States' security strategy, the "war" on Big Tech, and current concerns such as cybersecurity. Focusing on the language of security discourse, it draws common threads from the ancient world to the present day and the near future. The book grounds recent comparisons of Donald Trump to the Emperor Nero in a linguistic evidence base. It examines the potential impact on society of policy-makers' emphasis on the novelty of cybercrime, their likening of the internet to the Wild West, and their claims that criminals have "gone dark". It questions governments' descriptions of technology companies in words normally reserved for terrorists, and asks who might benefit. Interdisciplinary in approach, the book builds on existing literature in the Humanities and Social Sciences, most notably studies on rhetoric in Greco-Roman texts, and on the articulation of security concerns in law, international relations, and public policy contexts. It adds value to this body of research by offering new points of comparison, and a fresh but tried and tested way of looking at problems that are often presented as unprecedented. It will be essential to legal and policy practitioners, students of Law, Politics, Media, and Classics, and all those interested in employing critical thinking.

National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Paperback): Sybil... National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Paperback)
Sybil Sharpe
R1,367 Discovery Miles 13 670 Ships in 10 - 15 working days

There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.

The Construction of Truth in Contemporary Media Narratives about Risk (Hardcover): John Gaffey The Construction of Truth in Contemporary Media Narratives about Risk (Hardcover)
John Gaffey
R4,473 Discovery Miles 44 730 Ships in 10 - 15 working days

The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk. The book examines media risk narratives and explores forms of truth, experiential knowledge, and authority. Using the concept of parrhesia to show how we invest trust in various types of knowledge in a changing media environment, the book demonstrates how we choose between expert and non-expert information when navigating a seemingly risky world. It considers how news media formats have previously engaged audiences through risk narratives and examines how experiential knowledge has come to hold a valuable place for individuals navigating what we are often told is an increasingly risky and uncertain world. The book also examines the increasingly precarious position of expert knowledge and examines how contemporary truth-games play out between experts and non-experts, and considers how this extends into the world of online and social media. This book will be of interest to those researching or teaching in the areas of criminology, sociology, media and cultural studies, and of interest to readers in professional areas such as journalism and politics.

Internet of Things, Threats, Landscape, and Countermeasures (Hardcover): Stavros Shiaeles, Nicholas Kolokotronis Internet of Things, Threats, Landscape, and Countermeasures (Hardcover)
Stavros Shiaeles, Nicholas Kolokotronis
R3,824 Discovery Miles 38 240 Ships in 10 - 15 working days

Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.

Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century... Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century (Hardcover)
Sanja Milivojevic
R4,486 Discovery Miles 44 860 Ships in 10 - 15 working days

Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology. It poses criminological, legal, ethical, and policy questions linked to such development and anticipates the impact of DFTs on crime and offending. It forestalls their wide-ranging consequences, including the proliferation of new types of vulnerability, policing and other mechanisms of social control, and the threat of pervasive and intrusive surveillance. Two key concerns lie at the heart of this volume. First, the book investigates the origins and development of emerging DFTs and their interactions with criminal behaviour, crime prevention, victimisation, and crime control. It also investigates the future advances and likely impact of such processes on a range of social actors: citizens, non-citizens, offenders, victims of crime, judiciary and law enforcement, media, NGOs. This book does not adopt technological determinism that suggests technology alone drives social development. Yet, while it is impossible to know where the emerging technologies are taking us, there is no doubt that DFTs will shape the way we engage with and experience criminal behaviour in the twenty-first century. As such, this book starts the conversation about a range of essential topics that this expansion brings to social sciences, and begins to decipher challenges we will be facing in the future. An accessible and compelling read, this book will appeal to those engaged with criminology, sociology, politics, policymaking, and all those interested in the impact of DFTs on the criminal justice system.

Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century... Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century (Paperback)
Sanja Milivojevic
R1,253 Discovery Miles 12 530 Ships in 10 - 15 working days

Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology. It poses criminological, legal, ethical, and policy questions linked to such development and anticipates the impact of DFTs on crime and offending. It forestalls their wide-ranging consequences, including the proliferation of new types of vulnerability, policing and other mechanisms of social control, and the threat of pervasive and intrusive surveillance. Two key concerns lie at the heart of this volume. First, the book investigates the origins and development of emerging DFTs and their interactions with criminal behaviour, crime prevention, victimisation, and crime control. It also investigates the future advances and likely impact of such processes on a range of social actors: citizens, non-citizens, offenders, victims of crime, judiciary and law enforcement, media, NGOs. This book does not adopt technological determinism that suggests technology alone drives social development. Yet, while it is impossible to know where the emerging technologies are taking us, there is no doubt that DFTs will shape the way we engage with and experience criminal behaviour in the twenty-first century. As such, this book starts the conversation about a range of essential topics that this expansion brings to social sciences, and begins to decipher challenges we will be facing in the future. An accessible and compelling read, this book will appeal to those engaged with criminology, sociology, politics, policymaking, and all those interested in the impact of DFTs on the criminal justice system.

Seven Deadliest Unified Communications Attacks (Paperback): Dan York Seven Deadliest Unified Communications Attacks (Paperback)
Dan York
R547 R464 Discovery Miles 4 640 Save R83 (15%) Ships in 10 - 15 working days

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability. This book will be of interest to information security professionals of all levels as well as recreational hackers.

Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover): Brian Innes Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover)
Brian Innes
R620 R560 Discovery Miles 5 600 Save R60 (10%) Ships in 9 - 17 working days

For as long as historical annals have been kept, they have recorded the frauds and fakes that have been imposed upon innocent dupes. Perhaps the earliest Christian story of all is that which tells of the deception that Jacob practised on his unsuspecting father Abraham, pretending to be his brother Esau; and today the theft of identity is reported to be the most rapidly spreading crime. And throughout the ages works of art and literature, coinage, and documents of all kinds have been forged for profit, personal status - and even out of pure mischief. Fakes, Scams and Forgeries details many of the most notorious acts of forgery, fraud and fakery that have taken place over the centuries, describing how they were perpetrated, their acceptance by those who considered themselves experts, and how - often after many years - they were eventually detected. As well as providing entertaining and in-depth profiles of famous forgers and legendary frauds, the text deals with the many modern scientific techniques that have been developed for the examination of suspect materials.

Seven Deadliest Wireless Technologies Attacks (Paperback): Brad Haines Seven Deadliest Wireless Technologies Attacks (Paperback)
Brad Haines
R539 R476 Discovery Miles 4 760 Save R63 (12%) Ships in 10 - 15 working days

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Cybersecurity in the COVID-19 Pandemic (Hardcover): Kenneth Okereafor Cybersecurity in the COVID-19 Pandemic (Hardcover)
Kenneth Okereafor
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.

Secure Searchable Encryption and Data Management (Hardcover): Mamta, Brij B. Gupta Secure Searchable Encryption and Data Management (Hardcover)
Mamta, Brij B. Gupta
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover): Brij B.... Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover)
Brij B. Gupta, Amrita Dahiya
R1,579 Discovery Miles 15 790 Ships in 10 - 15 working days

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.

Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Hardcover): Andrew A. Bochman,... Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Hardcover)
Andrew A. Bochman, Sarah Freeman
R2,216 Discovery Miles 22 160 Ships in 10 - 15 working days

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.

Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R3,995 Discovery Miles 39 950 Ships in 10 - 15 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Testing and Securing Web Applications (Hardcover): Ravi Das, Greg Johnson Testing and Securing Web Applications (Hardcover)
Ravi Das, Greg Johnson
R4,214 Discovery Miles 42 140 Ships in 10 - 15 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Testing and Securing Web Applications (Paperback): Ravi Das, Greg Johnson Testing and Securing Web Applications (Paperback)
Ravi Das, Greg Johnson
R1,747 Discovery Miles 17 470 Ships in 10 - 15 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Image-based Sexual Abuse - A Study on the Causes and Consequences of Non-consensual Nude or Sexual Imagery (Hardcover): Nicola... Image-based Sexual Abuse - A Study on the Causes and Consequences of Non-consensual Nude or Sexual Imagery (Hardcover)
Nicola Henry, Clare McGlynn, Asher Flynn, Kelly Johnson, Anastasia Powell, …
R4,488 Discovery Miles 44 880 Ships in 10 - 15 working days

This book investigates the causes and consequences of image-based sexual abuse in a digital era. Image-based sexual abuse refers to the taking or sharing of nude or sexual photographs or videos of another person without their consent. It includes a diversity of behaviours beyond that of "revenge porn", such as the secret trading of nude or sexual images online; "upskirting", "downblousing" and other "creepshots"; blackmail or "sextortion" scams; the use of artificial intelligence to construct "deepfake" pornographic videos; threats to distribute photographs and videos without consent; and the taking or sharing of sexual assault imagery. This book investigates the pervasiveness and experiences of these harms, as well as the raft of legal and non-legal measures that have been introduced to better respond to and prevent image-based sexual abuse. The book draws on groundbreaking empirical research, including surveys in three countries with over 6,000 respondents and over 100 victim-survivor and stakeholder interviews. Guided by theoretical frameworks from gender studies, sociology, criminology, law and psychology, the authors argue that image-based sexual abuse is more commonly perpetrated by men than women, and that perpetration is higher among some groups, including younger and sexuality minority men. Although the motivations of perpetrators vary, a dominant theme to emerge was that of power and control. The gendered nature of the abuse means that it is best understood as a "continuum of sexual violence" because victim-survivors often experience it as part of a broader pattern of gendered harassment, violence and abuse. Written in a clear and direct style, this book will appeal to students and scholars of criminology, sociology, law and psychology. Image-based Sexual Abuse is also an essential resource for activists, legal and policy practitioners, technology companies and victim-survivors seeking to understand the deeply complex nature of intimate-image sharing in a digital era.

Information Security Technologies for Controlling Pandemics (Hardcover, 1st ed. 2021): Hamid Jahankhani, Stefan Kendzierskyj,... Information Security Technologies for Controlling Pandemics (Hardcover, 1st ed. 2021)
Hamid Jahankhani, Stefan Kendzierskyj, Babak Akhgar
R4,085 Discovery Miles 40 850 Ships in 18 - 22 working days

The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.

Cyber Strategy - Risk-Driven Security and Resiliency (Hardcover): Carol A. Siegel, Mark Sweeney Cyber Strategy - Risk-Driven Security and Resiliency (Hardcover)
Carol A. Siegel, Mark Sweeney
R3,359 Discovery Miles 33 590 Ships in 10 - 15 working days

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback)
James S. Tiller
R1,866 Discovery Miles 18 660 Ships in 10 - 15 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible. The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization. Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition (Paperback, 6th edition): Allen Harper, Ryan Linn, Stephen... Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition (Paperback, 6th edition)
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, …
R1,003 Discovery Miles 10 030 Ships in 10 - 15 working days

Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy's devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering the latest threats Includes proof-of-concept code stored on the GitHub repository Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides

Net.Wars (Hardcover, New): Wendy Grossman Net.Wars (Hardcover, New)
Wendy Grossman
R2,858 Discovery Miles 28 580 Ships in 18 - 22 working days

Full text online version at www.nyupress.org/netwars.

Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff.

From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it.

How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer and Intrusion Forensics
George Mohay, Alison Anderson, … Hardcover R2,583 Discovery Miles 25 830
XBOX 360 Forensics - A Digital Forensics…
Steven Bolt Paperback R1,141 Discovery Miles 11 410
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
Advanced Smart Computing Technologies in…
Keshav Kaushik, Shubham Tayal, … Hardcover R3,022 Discovery Miles 30 220
Advanced Persistent Threat…
Eric Cole Paperback R1,111 Discovery Miles 11 110
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
There's a War Going On But No One Can…
Huib Modderkolk Paperback R285 R259 Discovery Miles 2 590
No Tech Hacking - A Guide to Social…
Johnny Long Paperback R994 R833 Discovery Miles 8 330
Low Tech Hacking - Street Smarts for…
Jack Wiles, Terry Gudaitis, … Paperback R986 R862 Discovery Miles 8 620
Managing Catastrophic Loss of Sensitive…
Constantine Photopoulos Paperback R1,265 Discovery Miles 12 650

 

Partners