0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (31)
  • R500+ (313)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover): Brian Innes Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover)
Brian Innes
R659 R591 Discovery Miles 5 910 Save R68 (10%) Ships in 9 - 17 working days

For as long as historical annals have been kept, they have recorded the frauds and fakes that have been imposed upon innocent dupes. Perhaps the earliest Christian story of all is that which tells of the deception that Jacob practised on his unsuspecting father Abraham, pretending to be his brother Esau; and today the theft of identity is reported to be the most rapidly spreading crime. And throughout the ages works of art and literature, coinage, and documents of all kinds have been forged for profit, personal status - and even out of pure mischief. Fakes, Scams and Forgeries details many of the most notorious acts of forgery, fraud and fakery that have taken place over the centuries, describing how they were perpetrated, their acceptance by those who considered themselves experts, and how - often after many years - they were eventually detected. As well as providing entertaining and in-depth profiles of famous forgers and legendary frauds, the text deals with the many modern scientific techniques that have been developed for the examination of suspect materials.

Net.Wars (Hardcover, New): Wendy Grossman Net.Wars (Hardcover, New)
Wendy Grossman
R3,096 Discovery Miles 30 960 Ships in 10 - 15 working days

Full text online version at www.nyupress.org/netwars.

Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff.

From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it.

How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

Digital Piracy - A Global, Multidisciplinary Account (Hardcover): Steven Caldwell Brown, Thomas Holt Digital Piracy - A Global, Multidisciplinary Account (Hardcover)
Steven Caldwell Brown, Thomas Holt
R4,476 Discovery Miles 44 760 Ships in 12 - 19 working days

Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens. Bringing together perspectives from criminology, psychology, business, and adopting a morally neutral stance, this book offers a holistic overview of this growing phenomenon. It considers its cultural, commercial, and legal aspects, and brings together international research on a range of topics, such as copyright infringement, intellectual property, music publishing, movie piracy, and changes in consumer behaviour. This book offers a new perspective to the growing literature on cybercrime and digital security. This multi-disciplinary book is the first to bring together international research on digital piracy and will be key reading for researchers in the fields of criminology, psychology, law and business.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R3,143 Discovery Miles 31 430 Ships in 12 - 19 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Paperback): Ruth Taplin Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Paperback)
Ruth Taplin
R1,557 Discovery Miles 15 570 Ships in 12 - 19 working days

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information ("big data") held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book assesses the major cyber risks to businesses and discusses how they can be managed and the risks reduced. It includes case studies of the situation in different financial sectors and countries in relation to East Asia, Europe and the United States. It takes an interdisciplinary approach assessing cyber risks and management solutions from an economic, management risk, legal, security intelligence, insurance, banking and cultural perspective.

Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn
R487 R423 Discovery Miles 4 230 Save R64 (13%) Ships in 10 - 15 working days

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself. Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters -- activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O'Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.

Cyber Frauds, Scams and their Victims (Hardcover): Mark Button, Cassandra Cross Cyber Frauds, Scams and their Victims (Hardcover)
Mark Button, Cassandra Cross
R4,483 Discovery Miles 44 830 Ships in 12 - 19 working days

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.

Cybercrime and its victims (Hardcover): Elena Martellozzo, Emma Jane Cybercrime and its victims (Hardcover)
Elena Martellozzo, Emma Jane
R4,490 Discovery Miles 44 900 Ships in 12 - 19 working days

The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies. The book is organised thematically into five parts. Part one addresses some broad conceptual and theoretical issues. Part two is concerned with issues relating to sexual violence, abuse, and exploitation, as well as to sexual expression online. Part three addresses issues related to race and culture. Part four addresses concerns around cyberbullying and online suicide, grouped together as 'social violence'. The final part argues that victims of cybercrime are, in general, neglected and not receiving the recognition and support they need and deserve. It concludes that in the volatile and complex world of cyberspace continued awareness-raising is essential for bringing attention to the plight of victims. It also argues that there needs to be more support of all kinds for victims, as well as an increase in the exposure and punishment of perpetrators. Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.

Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Hardcover): Robert Pasley Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Hardcover)
Robert Pasley
R4,483 Discovery Miles 44 830 Ships in 12 - 19 working days

In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.

Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Paperback): Robert Pasley Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Paperback)
Robert Pasley
R1,544 Discovery Miles 15 440 Ships in 12 - 19 working days

In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.

Sex and the Internet - A Guide Book for Clinicians (Hardcover): Al Cooper Sex and the Internet - A Guide Book for Clinicians (Hardcover)
Al Cooper
R3,890 Discovery Miles 38 900 Ships in 12 - 19 working days

First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.

Hacker's Delight (Hardcover, 2nd edition): Henry Warren Hacker's Delight (Hardcover, 2nd edition)
Henry Warren
R1,612 R1,253 Discovery Miles 12 530 Save R359 (22%) Ships in 12 - 19 working days

In "Hacker's Delight, Second Edition," Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren's hacks are eminently practical, but they're also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.
Extensive additions in this edition include A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code A new chapter on error correcting codes (ECC), including routines for the Hamming code More coverage of integer division by constants, including methods using only shifts and adds Computing remainders without computing a quotient More coverage of population count and counting leading zeros Array population count New algorithms for compress and expand An LRU algorithm Floating-point to/from integer conversions Approximate floating-point reciprocal square root routine A gallery of graphs of discrete functions Now with exercises and answers

Security For Software Engineers (Paperback): James N. Helfrich Security For Software Engineers (Paperback)
James N. Helfrich
R897 Discovery Miles 8 970 Ships with 15 working days

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: Targets software engineering students - one of the only security texts to target this audience. Focuses on the white-hat side of the security equation rather than the black-hat side. Includes many practical and real-world examples that easily translate into the workplace. Covers a one-semester undergraduate course. Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user's information assets.

Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R1,175 Discovery Miles 11 750 Ships in 12 - 19 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

Technocrime: Policing and Surveillance (Paperback): Stephane Leman-Langlois Technocrime: Policing and Surveillance (Paperback)
Stephane Leman-Langlois
R1,781 Discovery Miles 17 810 Ships in 12 - 19 working days

The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.

Technocrime: Policing and Surveillance (Hardcover): Stephane Leman-Langlois Technocrime: Policing and Surveillance (Hardcover)
Stephane Leman-Langlois
R4,622 Discovery Miles 46 220 Ships in 12 - 19 working days

The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,555 Discovery Miles 15 550 Ships in 12 - 19 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback): Will Gragido, John Pirc Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback)
Will Gragido, John Pirc
R1,278 R990 Discovery Miles 9 900 Save R288 (23%) Ships in 12 - 19 working days

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.

Managed Code Rootkits - Hooking into Runtime Environments (Paperback): Erez Metula Managed Code Rootkits - Hooking into Runtime Environments (Paperback)
Erez Metula
R1,060 R922 Discovery Miles 9 220 Save R138 (13%) Ships in 12 - 19 working days

Imagine being able to change the languages for the applicationsthat a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks.Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed codethat a computeris running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, makingthis book a one stop shop for this new attack vector.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec Reviews"Introduces the reader briefly to managed code environments and rootkits in generalCompletely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementationFocuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios"

Cyber-Security Threats, Actors, and Dynamic Mitigation (Hardcover): Nicholas Kolokotronis, Stavros Shiaeles Cyber-Security Threats, Actors, and Dynamic Mitigation (Hardcover)
Nicholas Kolokotronis, Stavros Shiaeles
R3,738 Discovery Miles 37 380 Ships in 12 - 19 working days

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition): Thomas J. Holt, Adam M Bossler, Kathryn C... Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition)
Thomas J. Holt, Adam M Bossler, Kathryn C Seigfried-Spellar
R1,324 Discovery Miles 13 240 Ships in 9 - 17 working days

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: * key theoretical and methodological perspectives; * computer hacking and malicious software; * digital piracy and intellectual theft; * economic crime and online fraud; * pornography and online sex crime; * cyber-bullying and cyber-stalking; * cyber-terrorism and extremism; * the rise of the Dark Web; * digital forensic investigation and its legal context around the world; * the law enforcement response to cybercrime transnationally; * cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

Fraud Examiners in White-Collar Crime Investigations (Paperback): Petter Gottschalk Fraud Examiners in White-Collar Crime Investigations (Paperback)
Petter Gottschalk
R1,385 Discovery Miles 13 850 Ships in 12 - 19 working days

In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime. He also presents a general theory regarding the economic, organizational, and behavioral dimensions of its perpetrators. Pool Your Resources for a Successful Investigation Gottschalk emphasizes the importance of collaboration across multiple disciplines including accounting, law, and forensic science in solving each case of suspected white-collar crime. He describes each case as a "puzzle" or "project" consisting of several steps and several participating individuals or organizations. Since so many people participate in an investigation, Gottschalk advises that objectively acquired and communicated information is vital to successful results. Fraud Examiners in White-Collar Crime Investigations approaches case studies from the perspectives of police science and detective work rather than auditing and legal thinking. Gottschalk asserts that "the private detective rather than the firm lawyer" is the more potentially successful fraud examiner. His approach emphasizes the importance of using strategy and practice in yielding results toward solving a case and highlights the use of interviews. He looks at the role of people as significant resources of information to help solve white-collar criminal cases and explains how a well-conducted interview can have a significant impact on the progress of an investigation. Through the analyses theories Gottschalk presents, this book gives you a useful tool for understanding characteristics of white-collar crime and for devising strategies for conducting and evaluating investigations of suspected white-collar crimes.

National Cyber Emergencies - The Return to Civil Defence (Hardcover): Greg Austin National Cyber Emergencies - The Return to Civil Defence (Hardcover)
Greg Austin
R4,475 Discovery Miles 44 750 Ships in 12 - 19 working days

This book documents and explains civil defence preparations for national cyber emergencies in conditions of both peace and war. The volume analyses the escalating sense of crisis around state-sponsored cyber attacks that has emerged since 2015, when the United States first declared a national emergency in cyberspace. It documents a shift in thinking in the USA, from cooperative resilience-oriented approaches at national level to more highly regulated, state-led civil defence initiatives. Although the American response has been mirrored in other countries, the shift is far from universal. Civil defence strategies have come into play but the global experience of that has not been consistent or even that successful. Containing contributions from well-placed scholars and practitioners, this volume reviews a selection of national experiences (from the USA, Australia, India, China, Estonia, and Finland) and a number of key thematic issues (information weapons, alliance coordination, and attack simulations). These demonstrate a disconnect between the deepening sense of vulnerability and the availability of viable solutions at the national level. Awareness of this gap may ultimately lead to more internationally oriented cooperation, but the trend for now appears to be more conflictual and rooted in a growing sense of insecurity. This book will be of much interest to students of cyber security, homeland security, disaster management, and international relations, as well as practitioners and policy-makers.

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R876 Discovery Miles 8 760 Ships in 12 - 19 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover): Sybil... National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover)
Sybil Sharpe
R4,461 Discovery Miles 44 610 Ships in 12 - 19 working days

There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hacking
Walter Spivak Hardcover R939 Discovery Miles 9 390
E-Commerce Security-Advice From Experts
Khosrow-Pour Paperback R698 Discovery Miles 6 980
Security, Privacy and User Interaction
Markus Jakobsson Hardcover R1,521 Discovery Miles 15 210
Masters of Deception: the Gang That…
Michele Slatalla Paperback R480 R444 Discovery Miles 4 440
At Any Cost - The South African…
Stephen Timm Paperback R385 R361 Discovery Miles 3 610
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R524 Discovery Miles 5 240
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R500 Discovery Miles 5 000
Seven Deadliest Web Application Attacks
Mike Shema Paperback R609 Discovery Miles 6 090
The Pentester BluePrint - Starting a…
PL Wylie Paperback R690 R636 Discovery Miles 6 360
Introduction to Cybercrime - Computer…
Joshua B. Hill, Nancy E. Marion Hardcover R2,523 Discovery Miles 25 230

 

Partners