0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (32)
  • R500+ (312)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover): Sybil... National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover)
Sybil Sharpe
R4,461 Discovery Miles 44 610 Ships in 12 - 19 working days

There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.

The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover)
James S. Tiller
R3,897 Discovery Miles 38 970 Ships in 12 - 19 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.

The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization.

Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Digital Music Distribution - The Sociology of Online Music Streams (Paperback): Hendrik Storstein Spilker Digital Music Distribution - The Sociology of Online Music Streams (Paperback)
Hendrik Storstein Spilker
R1,431 Discovery Miles 14 310 Ships in 12 - 19 working days

The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies.

Botnets - Architectures, Countermeasures, and Challenges (Hardcover): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Hardcover)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R3,744 Discovery Miles 37 440 Ships in 12 - 19 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Computer Crimes and Digital Investigations (Hardcover, 2nd Revised edition): Ian Walden Computer Crimes and Digital Investigations (Hardcover, 2nd Revised edition)
Ian Walden 1
R5,380 Discovery Miles 53 800 Ships in 12 - 19 working days

Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.

The Human Factor of Cybercrime (Paperback): Rutger Leukfeldt, Thomas J. Holt The Human Factor of Cybercrime (Paperback)
Rutger Leukfeldt, Thomas J. Holt
R1,381 Discovery Miles 13 810 Ships in 9 - 17 working days

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

Sex and the Internet - A Guide Book for Clinicians (Paperback): Al Cooper Sex and the Internet - A Guide Book for Clinicians (Paperback)
Al Cooper
R1,586 Discovery Miles 15 860 Ships in 12 - 19 working days


This groundbreaking book is the first of its kind to thoroughly explore the topic of cybersex and the effects of Internet use on sexuality. Focusing on treatment and assessment issues and the clinical implications of cybersex, this authoritative volume provides mental health professionals with an analysis of the most recent empirical evidence along with research specific to the impact of Internet use on couples and families, gay men, people with disabilities, children and the workplace. Edited by one of the leading researchers, clinicians, and authors in the emerging field of sex and the Internet, this book addresses the growing complexity of Internet sex issues and their impact on psychological functioning.

Related link: Free Email Alerting

Cyber Enigma - Unravelling the Terror in the Cyber World (Hardcover): E Dilipraj Cyber Enigma - Unravelling the Terror in the Cyber World (Hardcover)
E Dilipraj
R4,469 Discovery Miles 44 690 Ships in 12 - 19 working days

Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka

Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback):... Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback)
Thomas R. Peltier
R2,985 Discovery Miles 29 850 Ships in 12 - 19 working days

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.

The International Handbook of Computer Security (Hardcover): Jae Shim, Anique A. Qureshi, Joel G Siegel The International Handbook of Computer Security (Hardcover)
Jae Shim, Anique A. Qureshi, Joel G Siegel
R4,785 Discovery Miles 47 850 Ships in 12 - 19 working days

"The International Handbook of Computer Security" is designed to help information systems/computer professionals as well as business executives protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in what often seems a quagmire of computers, technology, networks, and software.
Major topics discussed are: security policies; physical security procedures; data preservation and protection; hardware and software protection and security; personnel management and security; network security, internal and external systems; contingency planning; legal and auditing planning and control.

CEH v11 Certified Ethical Hacker Study Guide + Practice Tests Set (Paperback): R Messier CEH v11 Certified Ethical Hacker Study Guide + Practice Tests Set (Paperback)
R Messier
R1,481 R1,358 Discovery Miles 13 580 Save R123 (8%) Ships in 12 - 19 working days

Master CEH v11 and identify your weak spots As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. CEH v11 Certified Ethical Hacker Study Guide and Practice Tests Set provides you with all of the technical review you need of CEH skills PLUS SEVEN practice tests to prove your readiness for exam day. About the CEH v11 Certified Ethical Hacker Study Guide The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, TWO full-length practice exams, electronic flashcards, and a glossary of key terms About the CEH v11 Certified Ethical Hacker Practice Tests CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. FIVE MORE complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day

Hackers - Crime and the Digital Sublime (Paperback, New): Paul Taylor Hackers - Crime and the Digital Sublime (Paperback, New)
Paul Taylor
R1,613 Discovery Miles 16 130 Ships in 12 - 19 working days


The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if we are to make the most of society's high-tech meddlers.

Hackers - Crime and the Digital Sublime (Hardcover): Paul Taylor Hackers - Crime and the Digital Sublime (Hardcover)
Paul Taylor
R4,627 Discovery Miles 46 270 Ships in 12 - 19 working days


The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if we are to make the most of society's high-tech meddlers.

Masters of Deception - The Worldwide White-Collar Crime Crisis and Ways to Protect Yourself (Hardcover): Louis R. Mizell Masters of Deception - The Worldwide White-Collar Crime Crisis and Ways to Protect Yourself (Hardcover)
Louis R. Mizell
R705 R608 Discovery Miles 6 080 Save R97 (14%) Ships in 12 - 19 working days

"White-collar criminals continue to pick our pockets to the tune of $300 billion every year. These 'socially acceptable' criminals rob more from companies and individuals with a pen or key stroke than a street thug can plunder with a high-powered pistol." —from the Introduction

In Masters of Deception, former special agent and intelligence officer Louis Mizell addresses the growing problem of white-collar crime in America. Using actual cases, Mizell exposes scores of perpetrators and their modus operandi, and offers invaluable advice on what to look for, how to avoid being a victim, and how to fight back.

Praise for Louis Mizell and Masters of Deception

"Mizell stands out as a true expert in crime and terrorism who earned his title fighting the bad guys in back alleys, courts, corporate suites, and the new global economy. No one else out there can match his knowledge of what the bad guys are doing and how." —James Grady, author of Six Days of the Condor and White Flame

"Masters of Deception exposes little known facts that should be revealed to the unsuspecting public. Mizell may well be the next Ralph Nader in exposing the many ways innocent people are victimized by white-collar crime." —Dr. Richard Ward, Associate Chancellor and Professor of Criminal Justice, University of Chicago at Illinois

White-collar crime is an alarming epidemic that has reached every big city and small town in America. Invading all sectors, from health care and religion to law and education, it claims millions of victims, and bilks taxpayers out of billions of dollars every year. In Masters of Deception, top crime expert Louis Mizell addresses this serious—and costly—problem, exposing some of the most notorious offenders, and providing precautionary measures everyone should take to avoid being "taken to the cleaners."

Leaving no get-rich-quick stone unturned, white-collar criminals strike from every angle. Whether they're doctors overbilling patients, charity workers pocketing donations, or lawyers abusing powers of attorney, their fraudulent practices cost individuals, companies, and institutions billions of dollars. Consider the following:

  • Every year an average of $160 million is stolen or embezzled from schools and colleges all over the country
  • Insurance fraud—property, casualty, and health—is a $95 billion-a-year scam
  • Credit card fraud costs taxpayers nearly $3 billion per year
  • Dishonest lawyers pocket more than $14 billion annually
  • More than $21 billion is being stolen from charities each year

In Masters of Deception, Mizell explores the full spectrum of white-collar crime and the misuse of power by professionals we trust, including health care, business, education, and religion. He reveals hundreds of actual cases, from local crimes to such highly publicized incidents as the PTL scandal. With his experienced analytical eye, Mizell is able to spot new and emerging trends and pinpoint signs to look for in identifying potential cons. Sharing his expertise and insight as a former special agent and intelligence officer, Mizell also offers proven tips for fighting back—specific to each sector—as well as an extensive list of contacts for receiving further information, getting help, or reporting a crime.

And anyone who believes that white- collar crime is nonviolent will be shocked to learn that crime in the suites causes as much death and injury as crime in the streets.

Masters of Deception is a timely and authoritative book that will not only raise awareness about white-collar crime, but also allow readers "to empower themselves with enough knowledge to never be a victim."

Crime in the Digital Age - Controlling Telecommunications and Cyberspace Illegalities (Paperback): Russell Smith Crime in the Digital Age - Controlling Telecommunications and Cyberspace Illegalities (Paperback)
Russell Smith
R1,497 Discovery Miles 14 970 Ships in 12 - 19 working days

Willie Sutton, a notorious American bank robber of fifty years ago, was once asked why he persisted in robbing banks. "Because that's where the money is," he is said to have replied. The theory that crime follows opportunity has become established wisdom in criminology; opportunity reduction has become one of the fundamental principles of crime prevention.

"The enormous benefits of telecommunications are not without cost." It could be argued that this quotation from Crime in the Digital Age, is a dramatic understatement. Grabosky and Smith advise us that the criminal opportunities which accompany these newest technological changes include: illegal interception of telecommunications; electronic vandalism and terrorism; theft of telecommunications services; telecommunications piracy; transmission of pornographic and other offensive material; telemarketing fraud; electronic funds transfer crime; electronic money laundering; and finally, telecommunications in furtherance of other criminal conspiracies.

However, although digitization has facilitated a great deal of criminal activity, the authors suggest that technology also provides the means to prevent and detect such crimes. Moreover, the varied nature of these crimes defies a single policy solution. Grabosky and Smith take us through this electronic minefield and discuss the issues facing Australia as well as the international community and law enforcement agencies.

Cyber Victimology - Decoding Cyber-Crime Victimisation (Hardcover): Debarati Halder Cyber Victimology - Decoding Cyber-Crime Victimisation (Hardcover)
Debarati Halder
R4,463 Discovery Miles 44 630 Ships in 12 - 19 working days

Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem

Digital Music Distribution - The Sociology of Online Music Streams (Hardcover): Hendrik Storstein Spilker Digital Music Distribution - The Sociology of Online Music Streams (Hardcover)
Hendrik Storstein Spilker
R4,469 Discovery Miles 44 690 Ships in 12 - 19 working days

The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies.

Cybercrime Prevention - Theory and Applications (Hardcover, 1st ed. 2019): Russell Brewer, Melissa De Vel-Palumbo, Alice... Cybercrime Prevention - Theory and Applications (Hardcover, 1st ed. 2019)
Russell Brewer, Melissa De Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, …
R1,890 Discovery Miles 18 900 Ships in 10 - 15 working days

This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an overview of the key principles, concepts and research literature associated with crime prevention, and discusses the interventions most commonly applied to crime problems. The authors review the theoretical underpinnings of these and analyses evidence for their efficacy. Cybercrime Prevention is split into three sections which examine primary prevention, secondary prevention and tertiary prevention. It provides a thorough discussion of what works and what does not, and offers a formulaic account of how traditional crime prevention interventions can be reimagined to apply to the digital realm.

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R1,029 Discovery Miles 10 290 Ships in 12 - 19 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Cybercrime - Key Issues and Debates (Paperback, 2nd edition): Alisdair A. Gillespie Cybercrime - Key Issues and Debates (Paperback, 2nd edition)
Alisdair A. Gillespie
R1,558 Discovery Miles 15 580 Ships in 9 - 17 working days

Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.

Cyber War Will Not Take Place (Paperback): Thomas Rid Cyber War Will Not Take Place (Paperback)
Thomas Rid
R360 R332 Discovery Miles 3 320 Save R28 (8%) Ships in 5 - 10 working days

'Cyber war is coming,' announced a landmark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the 'fifth domain' of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain?Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure?How serious is the threat of 'pure' cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Paperback): Erica Stanford Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Paperback)
Erica Stanford
R472 Discovery Miles 4 720 Ships in 12 - 19 working days

HIGHLY COMMENDED: Business Book Awards 2022 - Specialist Business Book Crypto is big news. You may be an existing user yourself or have friends that laud its promise of getting rich fast. Arm yourself with the knowledge to come out on top in the crypto wars. If thousands of people can lose billions of dollars in OneCoin, masterminded by the now infamous Missing Cryptoqueen made famous by the BBC's podcast series and called 'one of the biggest scams in history' by The Times, what makes you think your money is safe? OneCoin isn't alone. Crypto Wars reveals how some of the most shocking scams affected millions of innocent people all around the world with everything from religious leaders to celebrities involved. In this book, you get exclusive access to the back story of the most extreme Ponzi schemes, the most bizarre hoaxes and brutal exit strategies from some of the biggest charlatans of crypto. Crypto expert and educator, Erica Stanford, will show you how market-wide manipulation schemes, unregulated processes and a new collection of technologies that are often misunderstood, have been exploited to create the wild west of crypto, run by some less than reputable characters. From OneCoin to PonziCoin to Trumpcoin and everything in between, Crypto Wars uncovers the scandals, unpicks the system behind them and allows you to better understand a new technology that has the potential to revolutionize banking and our world for the better.

Delusive Speech In The Sharing Economy - Scam Inc (Hardcover): Julie Reid Delusive Speech In The Sharing Economy - Scam Inc (Hardcover)
Julie Reid
R4,463 Discovery Miles 44 630 Ships in 12 - 19 working days

In this examination of how the rise of online sharing economy platforms has facilitated online crime, this book shows how, while marketed as trustworthy peer-to-peer services, these platforms are highly vulnerable to misuse by scammers and are used for the dissemination of delusive speech.

The analysis centres around the concept of delusive speech, a sub-set of disinformation, designed to deceive and motivate by criminal intent. Looking beyond the economic and disruptive impacts of sharing economy platforms like Uber, Airbnb, and others, this book situates these Big Tech giants as mass communication channels that are frequently misused by bad actors to distribute dangerous content globally. Drawing from over 600 cases of victims lured into scams or physical danger via misleading Airbnb listings, the book provides a detailed case study exposing Airbnb's failure to establish legitimate safety measures despite branding its platform as a 'community of trust'. Incorporating netnography and thematic analysis, the author theorises the deceptive semiotic structure of delusive speech and evaluates practical mechanisms Airbnb could employ to prevent scams and crime on its platform.

With a global audience including researchers in communication and media studies, digital media, and media industries, as well as tech journalists, Silicon Valley critics, policymakers, and digital rights advocates, this book unmasks how sharing economy giants like Airbnb contribute to an epidemic of online deception causing real-world harm.

Information Security Technologies for Controlling Pandemics (Paperback, 1st ed. 2021): Hamid Jahankhani, Stefan Kendzierskyj,... Information Security Technologies for Controlling Pandemics (Paperback, 1st ed. 2021)
Hamid Jahankhani, Stefan Kendzierskyj, Babak Akhgar
R3,170 Discovery Miles 31 700 Ships in 10 - 15 working days

The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.

Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition): Edward Wilding Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition)
Edward Wilding
R4,498 Discovery Miles 44 980 Ships in 12 - 19 working days

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: c preventing computer fraud, IP theft and systems sabotage c adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse c securing information - in both electronic and hard copy form c understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes c dealing with catastrophic risk c best-practice for monitoring and securing office and wireless networks c responding to attempted extortion and malicious information leaks c conducting covert operations and forensic investigations c securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Video Surveillance Techniques and…
Vesna Zeljkovic Hardcover R5,878 Discovery Miles 58 780
Description Logics in Multimedia…
Leslie F Sikos Hardcover R3,865 Discovery Miles 38 650
3D Point Cloud Analysis - Traditional…
Shan Liu, Min Zhang, … Hardcover R3,357 Discovery Miles 33 570
Algorithms and Data Structures - 16th…
Zachary Friggstad, Joerg-Rudiger Sack, … Paperback R1,615 Discovery Miles 16 150
Time-dependent Problems in Imaging and…
Barbara Kaltenbacher, Thomas Schuster, … Hardcover R4,265 Discovery Miles 42 650
Optimization Techniques in Computer…
Mongi A. Abidi, Andrei V. Gribok, … Hardcover R4,314 Discovery Miles 43 140
Cardiovascular and Coronary Artery…
Ayman S. El-Baz, Jasjit S. Suri Paperback R4,040 Discovery Miles 40 400
Computational Diffusion MRI - MICCAI…
Elisenda Bonet-Carne, Jana Hutter, … Hardcover R4,359 Discovery Miles 43 590
Digital Imaging
Muhammad Sarfraz Hardcover R3,304 Discovery Miles 33 040
High Efficiency Video Coding (HEVC…
Vivienne Sze, Madhukar Budagavi, … Hardcover R4,602 Discovery Miles 46 020

 

Partners