0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R100 - R250 (4)
  • R250 - R500 (36)
  • R500+ (309)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

CEH Certified Ethical Hacker Bundle, Fifth Edition (Mixed media product, 5th edition): Matt Walker CEH Certified Ethical Hacker Bundle, Fifth Edition (Mixed media product, 5th edition)
Matt Walker
R1,009 Discovery Miles 10 090 Ships in 12 - 17 working days

Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions. This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they've learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams. This edition features up-to-date coverage of all nine domains of the CEH v11 exam and the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaingin access and clearing tracks. In all, the bundle includes more than 900 accurate questions with detailed answer explanations Online content includes test engine that provides full-length practice exams and customizable quizzes by chapter or exam domain This bundle is 33% cheaper than buying the two books separately

Information Security Technologies for Controlling Pandemics (Paperback, 1st ed. 2021): Hamid Jahankhani, Stefan Kendzierskyj,... Information Security Technologies for Controlling Pandemics (Paperback, 1st ed. 2021)
Hamid Jahankhani, Stefan Kendzierskyj, Babak Akhgar
R3,079 Discovery Miles 30 790 Ships in 10 - 15 working days

The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.

Cybercrime Through an Interdisciplinary Lens (Paperback): Thomas Holt Cybercrime Through an Interdisciplinary Lens (Paperback)
Thomas Holt
R1,269 R1,097 Discovery Miles 10 970 Save R172 (14%) Ships in 9 - 15 working days

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.

Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition): Edward Wilding Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition)
Edward Wilding
R3,906 Discovery Miles 39 060 Ships in 12 - 17 working days

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: c preventing computer fraud, IP theft and systems sabotage c adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse c securing information - in both electronic and hard copy form c understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes c dealing with catastrophic risk c best-practice for monitoring and securing office and wireless networks c responding to attempted extortion and malicious information leaks c conducting covert operations and forensic investigations c securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.

Security for Software Engineers (Paperback): James N. Helfrich Security for Software Engineers (Paperback)
James N. Helfrich
R930 R858 Discovery Miles 8 580 Save R72 (8%) Ships in 5 - 10 working days

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: Targets software engineering students - one of the only security texts to target this audience. Focuses on the white-hat side of the security equation rather than the black-hat side. Includes many practical and real-world examples that easily translate into the workplace. Covers a one-semester undergraduate course. Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user's information assets.

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New): Susan Young, Dave Aitel The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New)
Susan Young, Dave Aitel
R3,527 Discovery Miles 35 270 Ships in 12 - 17 working days

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Fraud Investigation and Forensic Accounting in the Real World (Hardcover): William L. Jennings Fraud Investigation and Forensic Accounting in the Real World (Hardcover)
William L. Jennings
R4,078 R3,798 Discovery Miles 37 980 Save R280 (7%) Ships in 12 - 17 working days

This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forensic accounting assignment and fraud investigation. The book opens with an explanation of what happened to a company that was ensnared in a huge commodity purchasing scheme. Using his knowledge and experience gained over 40 years, the author illustrates that unexpected fraud occurrences can happen to any company, in any industry. Additionally, the author explains the current white-collar crime threats that organizations face every day, as well as legal issues that are often implicated in forensic accounting and fraud investigation projects. Electronic and non-electronic evidence gathering is also covered in detail with illustrative examples. One chapter is devoted entirely to the often misunderstood, but extremely important, subject of witness interviews. It provides the correct approach to the analysis and correlation of evidence in determining findings and conclusions of an investigation. Another chapter is devoted to proper report writing. The author provides detailed guidance on presenting findings to a variety of audiences, including management, a board, law enforcement, and at trials and hearings. It also covers proper techniques for measuring economic damages and concludes with a useful index. William L. Jennings is a Senior Director at Delta Consulting Group. He is responsible for providing forensic accounting, investigation, and asset recovery services to corporations, government agencies, attorneys, and their clients, as well as business controls consulting services to organizations. With more than 40 years of experience in public accounting and auditing, forensic accounting, business valuation, investigation, asset recovery, and business controls development, Mr. Jennings has worked on hundreds of forensic accounting and investigation assignments and he provides expert testimony.

Malware Analysis Using Artificial Intelligence and Deep Learning (Paperback, 1st ed. 2021): Mark Stamp, Mamoun Alazab, Andrii... Malware Analysis Using Artificial Intelligence and Deep Learning (Paperback, 1st ed. 2021)
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
R5,058 Discovery Miles 50 580 Ships in 10 - 15 working days

This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September... Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
R3,106 Discovery Miles 31 060 Ships in 10 - 15 working days

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Digital Forensic Investigation of Internet of Things (IoT) Devices (Paperback, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Paperback, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R3,029 Discovery Miles 30 290 Ships in 10 - 15 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Cypherpunk Ethics - Radical Ethics for the Digital Age (Hardcover): Patrick D. Anderson Cypherpunk Ethics - Radical Ethics for the Digital Age (Hardcover)
Patrick D. Anderson
R1,483 Discovery Miles 14 830 Ships in 12 - 17 working days

Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age. Focusing on the writings of Timothy May and Julian Assange, two of the most prolific and influential cypherpunks, the book examines two competing paradigms of cypherpunk philosophy-crypto anarchy and crypto justice-and examines the implications of cypherpunk ethics for a range of contemporary moral issues, including surveillance, privacy, whistleblowing, cryptocurrencies, journalism, democracy, censorship, intellectual property, and power. Rooted in theory but with very real applications, this volume will appeal not only to students and scholars of digital media, communication, journalism, philosophy, political science, critical data studies, sociology, and the history of technology but also to technologists and activists around the world.

Security and Control in Information Systems - A Guide for Business and Accounting (Paperback): Andrew Hawker Security and Control in Information Systems - A Guide for Business and Accounting (Paperback)
Andrew Hawker
R2,127 Discovery Miles 21 270 Ships in 12 - 17 working days


Contents:
Introduction Part I:Threats and Risks 1.Information under Threat 2.Risk Appraisal Part II:Controls for Internal Services 3.Computerised Controls: the Organizational Context 4.Access Controls 5.Controls within Business Processes Part III:Controls for Networked Services 6.Controls for Network Communications 7.Managing Security for Network Services 8.Controls for Local Area Networks and Small Systems Part IV:Business Continuity and Archiving 9.Business Continuity 10.Controls for Archived Data Part V:Computer Audit 11.Computer Audit:Introduction of New Systems 12.Computer Audit: Control of Existing Systems 13.Computer Forensics Part VI:Regulation and Standards 14.Security Standards and Codes of Practice.

Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R2,798 Discovery Miles 27 980 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020): Leslie F Sikos, Kim-Kwang Raymond Choo Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020)
Leslie F Sikos, Kim-Kwang Raymond Choo
R4,948 Discovery Miles 49 480 Ships in 10 - 15 working days

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.

Digital Criminology - Crime and Justice in Digital Society (Paperback): Anastasia Powell, Gregory Stratton, Robin Cameron Digital Criminology - Crime and Justice in Digital Society (Paperback)
Anastasia Powell, Gregory Stratton, Robin Cameron
R1,309 Discovery Miles 13 090 Ships in 12 - 17 working days

The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday crimes. Digital Criminology: Crime and Justice in Digital Society is the first interdisciplinary scholarly investigation extending beyond traditional topics of cybercrime, policing and the law to consider the implications of digital society for public engagement with crime and justice movements. This book seeks to connect the disparate fields of criminology, sociology, legal studies, politics, media and cultural studies in the study of crime and justice. Drawing together intersecting conceptual frameworks, Digital Criminology examines conceptual, legal, political and cultural framings of crime, formal justice responses and informal citizen-led justice movements in our increasingly connected global and digital society. Building on case study examples from across Australia, Canada, Europe, China, the UK and the United States, Digital Criminology explores key questions including: What are the implications of an increasingly digital society for crime and justice? What effects will emergent technologies have for how we respond to crime and participate in crime debates? What will be the foundational shifts in criminological research and frameworks for understanding crime and justice in this technologically mediated context? What does it mean to be a 'just' digital citizen? How will digital communications and social networks enable new forms of justice and justice movements? Ultimately, the book advances the case for an emerging digital criminology: extending the practical and conceptual analyses of 'cyber' or 'e' crime beyond a focus foremost on the novelty, pathology and illegality of technology-enabled crimes, to understandings of online crime as inherently social. Twitter: @DigiCrimRMIT

The Human Factor of Cybercrime (Paperback): Rutger Leukfeldt, Thomas J. Holt The Human Factor of Cybercrime (Paperback)
Rutger Leukfeldt, Thomas J. Holt
R1,244 Discovery Miles 12 440 Ships in 12 - 17 working days

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

Digital Piracy - A Global, Multidisciplinary Account (Paperback): Steven Caldwell Brown, Thomas Holt Digital Piracy - A Global, Multidisciplinary Account (Paperback)
Steven Caldwell Brown, Thomas Holt
R1,277 Discovery Miles 12 770 Ships in 12 - 17 working days

Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens. Bringing together perspectives from criminology, psychology, business, and adopting a morally neutral stance, this book offers a holistic overview of this growing phenomenon. It considers its cultural, commercial, and legal aspects, and brings together international research on a range of topics, such as copyright infringement, intellectual property, music publishing, movie piracy, and changes in consumer behaviour. This book offers a new perspective to the growing literature on cybercrime and digital security. This multi-disciplinary book is the first to bring together international research on digital piracy and will be key reading for researchers in the fields of criminology, psychology, law and business.

Forensic Discovery (Paperback): Daniel Farmer, Wietse Venema Forensic Discovery (Paperback)
Daniel Farmer, Wietse Venema
R1,130 Discovery Miles 11 300 Ships in 12 - 17 working days

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of "Exploiting Software" and "Building Secure Software"

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
--Steve Bellovin, coauthor of "Firewalls and Internet Security, Second Edition," and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
--Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
--Rik Farrow, Consultant, author of "Internet Security for Home and Office"

"Farmer and Venema do for digital archaeology what Indiana Jones did for historicalarchaeology. "Forensic Discovery" unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
--Richard Bejtlich, technical director, ManTech CFIA, and author of "The Tao of Network Security Monitoring"

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
--Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
--Brian Carrier, digital forensics researcher, and author of "File System Forensic Analysis"The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a widevariety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to Understand essential forensics concepts: volatility, layering, and trustGather the maximum amount of reliable evidence from a running systemRecover partially destroyed information--and make sense of itTimeline your system: understand what really happened whenUncover secret changes to everything from system utilities to kernel modulesAvoid cover-ups and evidence traps set by intrudersIdentify the digital footprints associated with suspicious activityUnderstand file systems from a forensic analyst's point of viewAnalyze malware--without giving it a chance to escapeCapture and examine the contents of main memory on running systems Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover): Suneeta Satpathy, Sachi Mohanty Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover)
Suneeta Satpathy, Sachi Mohanty
R2,206 Discovery Miles 22 060 Ships in 12 - 17 working days

Digital forensics has recently gained a notable development and become the most demanding area in today's information security requirement. This book investigates the areas of digital forensics, digital investigation and data analysis procedures as they apply to computer fraud and cybercrime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence. Big Data Analytics and Computing for Digital Forensic Investigations gives a contemporary view on the problems of information security. It presents the idea that protective mechanisms and software must be integrated along with forensic capabilities into existing forensic software using big data computing tools and techniques. Features Describes trends of digital forensics served for big data and the challenges of evidence acquisition Enables digital forensic investigators and law enforcement agencies to enhance their digital investigation capabilities with the application of data science analytics, algorithms and fusion technique This book is focused on helping professionals as well as researchers to get ready with next-generation security systems to mount the rising challenges of computer fraud and cybercrimes as well as with digital forensic investigations. Dr Suneeta Satpathy has more than ten years of teaching experience in different subjects of the Computer Science and Engineering discipline. She is currently working as an associate professor in the Department of Computer Science and Engineering, College of Bhubaneswar, affiliated with Biju Patnaik University and Technology, Odisha. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis and decision mining. Dr Sachi Nandan Mohanty is an associate professor in the Department of Computer Science and Engineering at ICFAI Tech, ICFAI Foundation for Higher Education, Hyderabad, India. His research interests include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition and computational intelligence.

Cyber Mercenaries - The State, Hackers, and Power (Paperback): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Paperback)
Tim Maurer
R800 R667 Discovery Miles 6 670 Save R133 (17%) Ships in 10 - 15 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Cyber Mercenaries - The State, Hackers, and Power (Hardcover): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Hardcover)
Tim Maurer
R1,953 R1,626 Discovery Miles 16 260 Save R327 (17%) Ships in 12 - 17 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover): Richard Warner, Robert Sloan Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover)
Richard Warner, Robert Sloan
R1,557 Discovery Miles 15 570 Ships in 12 - 17 working days

The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019): Mohuya... Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019)
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J K Mandal
R4,297 Discovery Miles 42 970 Ships in 10 - 15 working days

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

Intelligent Mobile Malware Detection (Hardcover): Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran Intelligent Mobile Malware Detection (Hardcover)
Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran
R2,144 Discovery Miles 21 440 Ships in 12 - 17 working days

Unique selling point: * This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. * This book will be useful for researchers, students, developers and security analysts to know how malware behavior represented in the form of system call graphs can effectively detect Android malware. * The malware detection mechanisms in this book can be integrated with commercial antivirus softwares to detect Android malware including obfuscated variants.

Gender, Technology and Violence (Paperback): Marie Segrave, Laura Vitis Gender, Technology and Violence (Paperback)
Marie Segrave, Laura Vitis
R1,257 Discovery Miles 12 570 Ships in 12 - 17 working days

Technological developments move at lightening pace and can bring with them new possibilities for social harm. This book brings together original empirical and theoretical work examining how digital technologies both create and sustain various forms of gendered violence and provide platforms for resistance and criminal justice intervention. This edited collection is organised around two key themes of facilitation and resistance, with an emphasis through the whole collection on the development of a gendered interrogation of contemporary practices of technologically-enabled or enhanced practices of violence. Addressing a broad range of criminological issues such as intimate partner violence, rape and sexual assault, online sexual harassment, gendered political violence, online culture, cyberbullying, and human trafficking, and including a critical examination of the broader issue of feminist 'digilantism' and resistance to online sexual harassment, this book examines the ways in which new and emerging technologies facilitate new platforms for gendered violence as well as offering both formal and informal opportunities to prevent and/or respond to gendered violence.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information Security Technologies for…
Hamid Jahankhani, Stefan Kendzierskyj, … Hardcover R4,288 Discovery Miles 42 880
Permanent Record
Edward Snowden Paperback  (1)
R368 Discovery Miles 3 680
Advances in Digital Forensics II
Martin S Olivier, Sujeet Shenoi Hardcover R3,012 Discovery Miles 30 120
Game Over Girl
Naomi Gibson Paperback R202 Discovery Miles 2 020
Masters of Deception: the Gang That…
Michele Slatalla Paperback R436 R364 Discovery Miles 3 640
The Pentester BluePrint - Starting a…
PL Wylie Paperback R574 Discovery Miles 5 740
Malware Analysis Using Artificial…
Mark Stamp, Mamoun Alazab, … Hardcover R4,951 Discovery Miles 49 510
Computer and Intrusion Forensics
George Mohay, Alison Anderson, … Hardcover R2,717 Discovery Miles 27 170
Data Science in Cybersecurity and…
Leslie F Sikos, Kim-Kwang Raymond Choo Hardcover R4,897 Discovery Miles 48 970
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R479 Discovery Miles 4 790

 

Partners