![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Full text online version at www.nyupress.org/netwars. Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff. From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it. How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka
Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens. Bringing together perspectives from criminology, psychology, business, and adopting a morally neutral stance, this book offers a holistic overview of this growing phenomenon. It considers its cultural, commercial, and legal aspects, and brings together international research on a range of topics, such as copyright infringement, intellectual property, music publishing, movie piracy, and changes in consumer behaviour. This book offers a new perspective to the growing literature on cybercrime and digital security. This multi-disciplinary book is the first to bring together international research on digital piracy and will be key reading for researchers in the fields of criminology, psychology, law and business.
Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information ("big data") held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book assesses the major cyber risks to businesses and discusses how they can be managed and the risks reduced. It includes case studies of the situation in different financial sectors and countries in relation to East Asia, Europe and the United States. It takes an interdisciplinary approach assessing cyber risks and management solutions from an economic, management risk, legal, security intelligence, insurance, banking and cultural perspective.
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.
The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies. The book is organised thematically into five parts. Part one addresses some broad conceptual and theoretical issues. Part two is concerned with issues relating to sexual violence, abuse, and exploitation, as well as to sexual expression online. Part three addresses issues related to race and culture. Part four addresses concerns around cyberbullying and online suicide, grouped together as 'social violence'. The final part argues that victims of cybercrime are, in general, neglected and not receiving the recognition and support they need and deserve. It concludes that in the volatile and complex world of cyberspace continued awareness-raising is essential for bringing attention to the plight of victims. It also argues that there needs to be more support of all kinds for victims, as well as an increase in the exposure and punishment of perpetrators. Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.
In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.
In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.
First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.
Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books
Hacker extraordinaire Kevin Mitnick delivers the explosive encore
to his bestselling "The Art of Deception"
In "Hacker's Delight, Second Edition," Hank Warren once again
compiles an irresistible collection of programming hacks:
timesaving techniques, algorithms, and tricks that help programmers
build more elegant and efficient software, while also gaining
deeper insights into their craft. Warren's hacks are eminently
practical, but they're also intrinsically interesting, and
sometimes unexpected, much like the solution to a great puzzle.
They are, in a word, a delight to any programmer who is excited by
the opportunity to improve.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.
Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network," tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons. The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are "Easter eggs"-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker's search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker's presence on a computer system; and the underlying hacking culture.
Imagine being able to change the languages for the
applicationsthat a computer is running and taking control over it.
That is exactly what managed code rootkits can do when they are
placed within a computer. This new type of rootkit is hiding in a
place that had previously been safe from this type of attack-the
application level. Code reviews do not currently look for back
doors in the virtual machine (VM) where this new rootkit would be
injected. An invasion of this magnitude allows an attacker to steal
information on the infected computer, provide false information,
and disable security checks.Erez Metula shows the reader how these
rootkits are developed and inserted and how this attack can change
the managed codethat a computeris running, whether that be JAVA,
.NET, Android Dalvik or any other managed code. Management
development scenarios, tools like ReFrameworker, and
countermeasures are covered, makingthis book a one stop shop for
this new attack vector.
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.
The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.
In Fraud Examiners in White-Collar Crime Investigations, Petter Gottschalk examines and evaluates the investigative processes used to combat white-collar crime. He also presents a general theory regarding the economic, organizational, and behavioral dimensions of its perpetrators. Pool Your Resources for a Successful Investigation Gottschalk emphasizes the importance of collaboration across multiple disciplines including accounting, law, and forensic science in solving each case of suspected white-collar crime. He describes each case as a "puzzle" or "project" consisting of several steps and several participating individuals or organizations. Since so many people participate in an investigation, Gottschalk advises that objectively acquired and communicated information is vital to successful results. Fraud Examiners in White-Collar Crime Investigations approaches case studies from the perspectives of police science and detective work rather than auditing and legal thinking. Gottschalk asserts that "the private detective rather than the firm lawyer" is the more potentially successful fraud examiner. His approach emphasizes the importance of using strategy and practice in yielding results toward solving a case and highlights the use of interviews. He looks at the role of people as significant resources of information to help solve white-collar criminal cases and explains how a well-conducted interview can have a significant impact on the progress of an investigation. Through the analyses theories Gottschalk presents, this book gives you a useful tool for understanding characteristics of white-collar crime and for devising strategies for conducting and evaluating investigations of suspected white-collar crimes.
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.
This book documents and explains civil defence preparations for national cyber emergencies in conditions of both peace and war. The volume analyses the escalating sense of crisis around state-sponsored cyber attacks that has emerged since 2015, when the United States first declared a national emergency in cyberspace. It documents a shift in thinking in the USA, from cooperative resilience-oriented approaches at national level to more highly regulated, state-led civil defence initiatives. Although the American response has been mirrored in other countries, the shift is far from universal. Civil defence strategies have come into play but the global experience of that has not been consistent or even that successful. Containing contributions from well-placed scholars and practitioners, this volume reviews a selection of national experiences (from the USA, Australia, India, China, Estonia, and Finland) and a number of key thematic issues (information weapons, alliance coordination, and attack simulations). These demonstrate a disconnect between the deepening sense of vulnerability and the availability of viable solutions at the national level. Awareness of this gap may ultimately lead to more internationally oriented cooperation, but the trend for now appears to be more conflictual and rooted in a growing sense of insecurity. This book will be of much interest to students of cyber security, homeland security, disaster management, and international relations, as well as practitioners and policy-makers. |
You may like...
Advanced Image-Based Spam Detection and…
Sunita Vikrant Dhavale
Hardcover
R4,374
Discovery Miles 43 740
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda
Paperback
R1,208
Discovery Miles 12 080
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, …
Hardcover
R3,569
Discovery Miles 35 690
|