0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (27)
  • R500+ (297)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015):... Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense (Hardcover, 1st ed. 2015)
Kristin E. Heckman, Frank J Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
R3,362 R2,404 Discovery Miles 24 040 Save R958 (28%) Ships in 10 - 15 working days

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.

Cyber Frauds, Scams and their Victims (Hardcover): Mark Button, Cassandra Cross Cyber Frauds, Scams and their Victims (Hardcover)
Mark Button, Cassandra Cross
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.

Cybercrime and its victims (Hardcover): Elena Martellozzo, Emma Jane Cybercrime and its victims (Hardcover)
Elena Martellozzo, Emma Jane
R4,507 Discovery Miles 45 070 Ships in 10 - 15 working days

The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies. The book is organised thematically into five parts. Part one addresses some broad conceptual and theoretical issues. Part two is concerned with issues relating to sexual violence, abuse, and exploitation, as well as to sexual expression online. Part three addresses issues related to race and culture. Part four addresses concerns around cyberbullying and online suicide, grouped together as 'social violence'. The final part argues that victims of cybercrime are, in general, neglected and not receiving the recognition and support they need and deserve. It concludes that in the volatile and complex world of cyberspace continued awareness-raising is essential for bringing attention to the plight of victims. It also argues that there needs to be more support of all kinds for victims, as well as an increase in the exposure and punishment of perpetrators. Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.

Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Hardcover): Robert Pasley Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Hardcover)
Robert Pasley
R4,502 Discovery Miles 45 020 Ships in 10 - 15 working days

In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.

Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Paperback): Robert Pasley Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Paperback)
Robert Pasley
R1,541 Discovery Miles 15 410 Ships in 10 - 15 working days

In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.

Sex and the Internet - A Guide Book for Clinicians (Hardcover): Al Cooper Sex and the Internet - A Guide Book for Clinicians (Hardcover)
Al Cooper
R3,943 Discovery Miles 39 430 Ships in 10 - 15 working days

First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R3,100 Discovery Miles 31 000 Ships in 10 - 15 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Technocrime: Policing and Surveillance (Paperback): Stephane Leman-Langlois Technocrime: Policing and Surveillance (Paperback)
Stephane Leman-Langlois
R1,764 Discovery Miles 17 640 Ships in 10 - 15 working days

The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.

Hacker's Delight (Hardcover, 2nd edition): Henry Warren Hacker's Delight (Hardcover, 2nd edition)
Henry Warren
R1,240 R1,033 Discovery Miles 10 330 Save R207 (17%) Ships in 5 - 10 working days

In "Hacker's Delight, Second Edition," Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren's hacks are eminently practical, but they're also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.
Extensive additions in this edition include A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code A new chapter on error correcting codes (ECC), including routines for the Hamming code More coverage of integer division by constants, including methods using only shifts and adds Computing remainders without computing a quotient More coverage of population count and counting leading zeros Array population count New algorithms for compress and expand An LRU algorithm Floating-point to/from integer conversions Approximate floating-point reciprocal square root routine A gallery of graphs of discrete functions Now with exercises and answers

Technocrime: Policing and Surveillance (Hardcover): Stephane Leman-Langlois Technocrime: Policing and Surveillance (Hardcover)
Stephane Leman-Langlois
R4,632 Discovery Miles 46 320 Ships in 10 - 15 working days

The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.

The Human Factor of Cybercrime (Paperback): Rutger Leukfeldt, Thomas J. Holt The Human Factor of Cybercrime (Paperback)
Rutger Leukfeldt, Thomas J. Holt
R1,386 Discovery Miles 13 860 Ships in 9 - 17 working days

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback): Will Gragido, John Pirc Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback)
Will Gragido, John Pirc
R1,202 R936 Discovery Miles 9 360 Save R266 (22%) Ships in 10 - 15 working days

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition (Paperback, Revised edition): Jayson E. Street, Kent Nabors, Brian... Dissecting the Hack: The F0rb1dd3n Network, Revised Edition (Paperback, Revised edition)
Jayson E. Street, Kent Nabors, Brian Baskin, Marcus J. Carey
R622 R580 Discovery Miles 5 800 Save R42 (7%) Ships in 10 - 15 working days

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network," tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons. The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are "Easter eggs"-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker's search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker's presence on a computer system; and the underlying hacking culture.

Managed Code Rootkits - Hooking into Runtime Environments (Paperback): Erez Metula Managed Code Rootkits - Hooking into Runtime Environments (Paperback)
Erez Metula
R996 R871 Discovery Miles 8 710 Save R125 (13%) Ships in 10 - 15 working days

Imagine being able to change the languages for the applicationsthat a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks.Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed codethat a computeris running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, makingthis book a one stop shop for this new attack vector.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec Reviews"Introduces the reader briefly to managed code environments and rootkits in generalCompletely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementationFocuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios"

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R885 Discovery Miles 8 850 Ships in 10 - 15 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover)
James S. Tiller
R3,950 Discovery Miles 39 500 Ships in 10 - 15 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.

The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization.

Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Fraud Examiners in White-Collar Crime Investigations (Paperback): Petter Gottschalk Fraud Examiners in White-Collar Crime Investigations (Paperback)
Petter Gottschalk
R1,392 Discovery Miles 13 920 Ships in 10 - 15 working days

In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime. He also presents a general theory regarding the economic, organizational, and behavioral dimensions of its perpetrators. Pool Your Resources for a Successful Investigation Gottschalk emphasizes the importance of collaboration across multiple disciplines including accounting, law, and forensic science in solving each case of suspected white-collar crime. He describes each case as a "puzzle" or "project" consisting of several steps and several participating individuals or organizations. Since so many people participate in an investigation, Gottschalk advises that objectively acquired and communicated information is vital to successful results. Fraud Examiners in White-Collar Crime Investigations approaches case studies from the perspectives of police science and detective work rather than auditing and legal thinking. Gottschalk asserts that "the private detective rather than the firm lawyer" is the more potentially successful fraud examiner. His approach emphasizes the importance of using strategy and practice in yielding results toward solving a case and highlights the use of interviews. He looks at the role of people as significant resources of information to help solve white-collar criminal cases and explains how a well-conducted interview can have a significant impact on the progress of an investigation. Through the analyses theories Gottschalk presents, this book gives you a useful tool for understanding characteristics of white-collar crime and for devising strategies for conducting and evaluating investigations of suspected white-collar crimes.

National Cyber Emergencies - The Return to Civil Defence (Hardcover): Greg Austin National Cyber Emergencies - The Return to Civil Defence (Hardcover)
Greg Austin
R4,494 Discovery Miles 44 940 Ships in 10 - 15 working days

This book documents and explains civil defence preparations for national cyber emergencies in conditions of both peace and war. The volume analyses the escalating sense of crisis around state-sponsored cyber attacks that has emerged since 2015, when the United States first declared a national emergency in cyberspace. It documents a shift in thinking in the USA, from cooperative resilience-oriented approaches at national level to more highly regulated, state-led civil defence initiatives. Although the American response has been mirrored in other countries, the shift is far from universal. Civil defence strategies have come into play but the global experience of that has not been consistent or even that successful. Containing contributions from well-placed scholars and practitioners, this volume reviews a selection of national experiences (from the USA, Australia, India, China, Estonia, and Finland) and a number of key thematic issues (information weapons, alliance coordination, and attack simulations). These demonstrate a disconnect between the deepening sense of vulnerability and the availability of viable solutions at the national level. Awareness of this gap may ultimately lead to more internationally oriented cooperation, but the trend for now appears to be more conflictual and rooted in a growing sense of insecurity. This book will be of much interest to students of cyber security, homeland security, disaster management, and international relations, as well as practitioners and policy-makers.

Sex and the Internet - A Guide Book for Clinicians (Paperback): Al Cooper Sex and the Internet - A Guide Book for Clinicians (Paperback)
Al Cooper
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days


This groundbreaking book is the first of its kind to thoroughly explore the topic of cybersex and the effects of Internet use on sexuality. Focusing on treatment and assessment issues and the clinical implications of cybersex, this authoritative volume provides mental health professionals with an analysis of the most recent empirical evidence along with research specific to the impact of Internet use on couples and families, gay men, people with disabilities, children and the workplace. Edited by one of the leading researchers, clinicians, and authors in the emerging field of sex and the Internet, this book addresses the growing complexity of Internet sex issues and their impact on psychological functioning.

Related link: Free Email Alerting

Digital Music Distribution - The Sociology of Online Music Streams (Paperback): Hendrik Storstein Spilker Digital Music Distribution - The Sociology of Online Music Streams (Paperback)
Hendrik Storstein Spilker
R1,434 Discovery Miles 14 340 Ships in 10 - 15 working days

The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies.

Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback):... Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback)
Thomas R. Peltier
R2,952 Discovery Miles 29 520 Ships in 10 - 15 working days

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.

National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover): Sybil... National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover)
Sybil Sharpe
R4,481 Discovery Miles 44 810 Ships in 10 - 15 working days

There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.

Botnets - Architectures, Countermeasures, and Challenges (Hardcover): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Hardcover)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R3,806 Discovery Miles 38 060 Ships in 10 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

The International Handbook of Computer Security (Hardcover): Jae Shim, Anique A. Qureshi, Joel G Siegel The International Handbook of Computer Security (Hardcover)
Jae Shim, Anique A. Qureshi, Joel G Siegel
R4,785 Discovery Miles 47 850 Ships in 10 - 15 working days

"The International Handbook of Computer Security" is designed to help information systems/computer professionals as well as business executives protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in what often seems a quagmire of computers, technology, networks, and software.
Major topics discussed are: security policies; physical security procedures; data preservation and protection; hardware and software protection and security; personnel management and security; network security, internal and external systems; contingency planning; legal and auditing planning and control.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda Paperback R1,208 Discovery Miles 12 080
Security and Control in Information…
Andrew Hawker Hardcover R5,784 Discovery Miles 57 840
Computer and Intrusion Forensics
George Mohay, Alison Anderson, … Hardcover R2,583 Discovery Miles 25 830
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R474 Discovery Miles 4 740
Computer Crimes and Digital…
Ian Walden Hardcover  (1)
R5,062 Discovery Miles 50 620
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650
Introduction to Cybercrime - Computer…
Joshua B. Hill, Nancy E. Marion Hardcover R2,521 R2,383 Discovery Miles 23 830
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
CEH Certified Ethical Hacker Bundle…
Matt Walker Mixed media product R1,030 Discovery Miles 10 300

 

Partners