0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (36)
  • R500+ (302)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback)
James S. Tiller
R1,775 Discovery Miles 17 750 Ships in 12 - 17 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible. The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization. Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover): Brian Innes Fakes, Scams & Forgeries - From Art to Counterfeit Cash (Hardcover)
Brian Innes
R646 R551 Discovery Miles 5 510 Save R95 (15%) Ships in 9 - 15 working days

For as long as historical annals have been kept, they have recorded the frauds and fakes that have been imposed upon innocent dupes. Perhaps the earliest Christian story of all is that which tells of the deception that Jacob practised on his unsuspecting father Abraham, pretending to be his brother Esau; and today the theft of identity is reported to be the most rapidly spreading crime. And throughout the ages works of art and literature, coinage, and documents of all kinds have been forged for profit, personal status - and even out of pure mischief. Fakes, Scams and Forgeries details many of the most notorious acts of forgery, fraud and fakery that have taken place over the centuries, describing how they were perpetrated, their acceptance by those who considered themselves experts, and how - often after many years - they were eventually detected. As well as providing entertaining and in-depth profiles of famous forgers and legendary frauds, the text deals with the many modern scientific techniques that have been developed for the examination of suspect materials.

Technocrime: Policing and Surveillance (Paperback): Stephane Leman-Langlois Technocrime: Policing and Surveillance (Paperback)
Stephane Leman-Langlois
R1,668 Discovery Miles 16 680 Ships in 12 - 17 working days

The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.

Cybercrime - Key Issues and Debates (Hardcover, 2nd edition): Alisdair A. Gillespie Cybercrime - Key Issues and Debates (Hardcover, 2nd edition)
Alisdair A. Gillespie
R5,424 Discovery Miles 54 240 Ships in 12 - 17 working days

Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.

Net.Wars (Hardcover, New): Wendy Grossman Net.Wars (Hardcover, New)
Wendy Grossman
R2,651 Discovery Miles 26 510 Ships in 10 - 15 working days

Full text online version at www.nyupress.org/netwars.

Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff.

From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it.

How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as "Wired, The Guardian," and "The Telegraph," assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R2,974 Discovery Miles 29 740 Ships in 12 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Digital Piracy - A Global, Multidisciplinary Account (Hardcover): Steven Caldwell Brown, Thomas Holt Digital Piracy - A Global, Multidisciplinary Account (Hardcover)
Steven Caldwell Brown, Thomas Holt
R4,368 Discovery Miles 43 680 Ships in 12 - 17 working days

Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens. Bringing together perspectives from criminology, psychology, business, and adopting a morally neutral stance, this book offers a holistic overview of this growing phenomenon. It considers its cultural, commercial, and legal aspects, and brings together international research on a range of topics, such as copyright infringement, intellectual property, music publishing, movie piracy, and changes in consumer behaviour. This book offers a new perspective to the growing literature on cybercrime and digital security. This multi-disciplinary book is the first to bring together international research on digital piracy and will be key reading for researchers in the fields of criminology, psychology, law and business.

Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Paperback): Ruth Taplin Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Paperback)
Ruth Taplin
R1,448 Discovery Miles 14 480 Ships in 12 - 17 working days

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information ("big data") held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book assesses the major cyber risks to businesses and discusses how they can be managed and the risks reduced. It includes case studies of the situation in different financial sectors and countries in relation to East Asia, Europe and the United States. It takes an interdisciplinary approach assessing cyber risks and management solutions from an economic, management risk, legal, security intelligence, insurance, banking and cultural perspective.

Cybercrime and its victims (Hardcover): Elena Martellozzo, Emma Jane Cybercrime and its victims (Hardcover)
Elena Martellozzo, Emma Jane
R4,087 Discovery Miles 40 870 Ships in 12 - 17 working days

The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies. The book is organised thematically into five parts. Part one addresses some broad conceptual and theoretical issues. Part two is concerned with issues relating to sexual violence, abuse, and exploitation, as well as to sexual expression online. Part three addresses issues related to race and culture. Part four addresses concerns around cyberbullying and online suicide, grouped together as 'social violence'. The final part argues that victims of cybercrime are, in general, neglected and not receiving the recognition and support they need and deserve. It concludes that in the volatile and complex world of cyberspace continued awareness-raising is essential for bringing attention to the plight of victims. It also argues that there needs to be more support of all kinds for victims, as well as an increase in the exposure and punishment of perpetrators. Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.

Cyber Frauds, Scams and their Victims (Hardcover): Mark Button, Cassandra Cross Cyber Frauds, Scams and their Victims (Hardcover)
Mark Button, Cassandra Cross
R4,080 Discovery Miles 40 800 Ships in 12 - 17 working days

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.

Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Hardcover): Robert Pasley Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Hardcover)
Robert Pasley
R4,081 Discovery Miles 40 810 Ships in 12 - 17 working days

In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.

Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Paperback): Robert Pasley Anatomy of a Banking Scandal - The Keystone Bank Failure-Harbinger of the 2008 Financial Crisis (Paperback)
Robert Pasley
R1,407 Discovery Miles 14 070 Ships in 12 - 17 working days

In the early 1990s, the First National Bank of Keystone in West Virginia began buying and securitizing subprime mortgages from all over the country, and quickly grew from a tiny bank with just $100 million in assets to over $1.1 billion. For three years, it was listed as the most profitable large community bank in the country. It was all a fraud. All of the securitization deals the bank entered into lost money. To hide that fact, bank insiders started cooking the books, and concealing that they were also embezzling millions of dollars from the bank. This was all hidden from the bank's attorneys and auditors, federal bank examiners, and even the board of directors of the bank. To keep the examiners at bay, the bank insiders did everything possible to avoid giving them access to documents they were entitled to see, documents they knew would sink their scheme. The head of the bank even went so far as to bury four large truckloads of documents in a ditch on her ranch. Robert S. Pasley explores the failure of the First National Bank of Keystone, the intrigue involved, and the lessons that could have been learned-and still can be learned-about how banks operate, how federal banking regulators supervise financial institutions, how agencies interact with one another, and how such failures can be avoided in the future.

Sex and the Internet - A Guide Book for Clinicians (Hardcover): Al Cooper Sex and the Internet - A Guide Book for Clinicians (Hardcover)
Al Cooper
R3,845 R3,646 Discovery Miles 36 460 Save R199 (5%) Ships in 12 - 17 working days

First Published in 2002. Routledge is an imprint of Taylor & Francis, an informa company.

There's a War Going On But No One Can See It (Paperback): Huib Modderkolk There's a War Going On But No One Can See It (Paperback)
Huib Modderkolk
R297 R247 Discovery Miles 2 470 Save R50 (17%) Ships in 9 - 15 working days

'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.

Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R1,133 Discovery Miles 11 330 Ships in 12 - 17 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,417 Discovery Miles 14 170 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Technocrime: Policing and Surveillance (Hardcover): Stephane Leman-Langlois Technocrime: Policing and Surveillance (Hardcover)
Stephane Leman-Langlois
R4,364 Discovery Miles 43 640 Ships in 12 - 17 working days

The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.

Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback): Will Gragido, John Pirc Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback)
Will Gragido, John Pirc
R1,253 R952 Discovery Miles 9 520 Save R301 (24%) Ships in 12 - 17 working days

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.

Managed Code Rootkits - Hooking into Runtime Environments (Paperback): Erez Metula Managed Code Rootkits - Hooking into Runtime Environments (Paperback)
Erez Metula
R1,039 R885 Discovery Miles 8 850 Save R154 (15%) Ships in 12 - 17 working days

Imagine being able to change the languages for the applicationsthat a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks.Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed codethat a computeris running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, makingthis book a one stop shop for this new attack vector.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec Reviews"Introduces the reader briefly to managed code environments and rootkits in generalCompletely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementationFocuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios"

The SME Business Guide to Fraud Risk Management (Paperback): Robert James Chapman The SME Business Guide to Fraud Risk Management (Paperback)
Robert James Chapman
R967 R630 Discovery Miles 6 300 Save R337 (35%) Ships in 9 - 15 working days

* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events.

Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition): Thomas J. Holt, Adam M Bossler, Kathryn C... Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition)
Thomas J. Holt, Adam M Bossler, Kathryn C Seigfried-Spellar
R1,222 Discovery Miles 12 220 Ships in 9 - 15 working days

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: * key theoretical and methodological perspectives; * computer hacking and malicious software; * digital piracy and intellectual theft; * economic crime and online fraud; * pornography and online sex crime; * cyber-bullying and cyber-stalking; * cyber-terrorism and extremism; * the rise of the Dark Web; * digital forensic investigation and its legal context around the world; * the law enforcement response to cybercrime transnationally; * cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

National Cyber Emergencies - The Return to Civil Defence (Hardcover): Greg Austin National Cyber Emergencies - The Return to Civil Defence (Hardcover)
Greg Austin
R4,073 Discovery Miles 40 730 Ships in 12 - 17 working days

This book documents and explains civil defence preparations for national cyber emergencies in conditions of both peace and war. The volume analyses the escalating sense of crisis around state-sponsored cyber attacks that has emerged since 2015, when the United States first declared a national emergency in cyberspace. It documents a shift in thinking in the USA, from cooperative resilience-oriented approaches at national level to more highly regulated, state-led civil defence initiatives. Although the American response has been mirrored in other countries, the shift is far from universal. Civil defence strategies have come into play but the global experience of that has not been consistent or even that successful. Containing contributions from well-placed scholars and practitioners, this volume reviews a selection of national experiences (from the USA, Australia, India, China, Estonia, and Finland) and a number of key thematic issues (information weapons, alliance coordination, and attack simulations). These demonstrate a disconnect between the deepening sense of vulnerability and the availability of viable solutions at the national level. Awareness of this gap may ultimately lead to more internationally oriented cooperation, but the trend for now appears to be more conflictual and rooted in a growing sense of insecurity. This book will be of much interest to students of cyber security, homeland security, disaster management, and international relations, as well as practitioners and policy-makers.

National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover): Sybil... National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover)
Sybil Sharpe
R4,060 Discovery Miles 40 600 Ships in 12 - 17 working days

There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R810 Discovery Miles 8 100 Ships in 12 - 17 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Botnets - Architectures, Countermeasures, and Challenges (Hardcover): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Hardcover)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R3,503 Discovery Miles 35 030 Ships in 12 - 17 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R579 R501 Discovery Miles 5 010
Digital Forensic Investigation of…
Reza Montasari, Hamid Jahankhani, … Hardcover R4,142 Discovery Miles 41 420
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,397 Discovery Miles 23 970
Permanent Record
Edward Snowden Paperback  (1)
R384 Discovery Miles 3 840
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,608 Discovery Miles 16 080
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R423 Discovery Miles 4 230
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,698 Discovery Miles 36 980
Seven Deadliest Web Application Attacks
Mike Shema Paperback R570 Discovery Miles 5 700
Masters of Deception: the Gang That…
Michele Slatalla Paperback R448 R381 Discovery Miles 3 810
The Pentester BluePrint - Starting a…
PL Wylie Paperback R600 Discovery Miles 6 000

 

Partners