0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (27)
  • R500+ (293)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Hackers - Crime and the Digital Sublime (Hardcover): Paul Taylor Hackers - Crime and the Digital Sublime (Hardcover)
Paul Taylor
R4,637 Discovery Miles 46 370 Ships in 10 - 15 working days


The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if we are to make the most of society's high-tech meddlers.

Crime in the Digital Age - Controlling Telecommunications and Cyberspace Illegalities (Paperback): Russell Smith Crime in the Digital Age - Controlling Telecommunications and Cyberspace Illegalities (Paperback)
Russell Smith
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

Willie Sutton, a notorious American bank robber of fifty years ago, was once asked why he persisted in robbing banks. "Because that's where the money is," he is said to have replied. The theory that crime follows opportunity has become established wisdom in criminology; opportunity reduction has become one of the fundamental principles of crime prevention.

"The enormous benefits of telecommunications are not without cost." It could be argued that this quotation from Crime in the Digital Age, is a dramatic understatement. Grabosky and Smith advise us that the criminal opportunities which accompany these newest technological changes include: illegal interception of telecommunications; electronic vandalism and terrorism; theft of telecommunications services; telecommunications piracy; transmission of pornographic and other offensive material; telemarketing fraud; electronic funds transfer crime; electronic money laundering; and finally, telecommunications in furtherance of other criminal conspiracies.

However, although digitization has facilitated a great deal of criminal activity, the authors suggest that technology also provides the means to prevent and detect such crimes. Moreover, the varied nature of these crimes defies a single policy solution. Grabosky and Smith take us through this electronic minefield and discuss the issues facing Australia as well as the international community and law enforcement agencies.

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition (Paperback, 6th edition): Allen Harper, Ryan Linn, Stephen... Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition (Paperback, 6th edition)
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, …
R1,058 Discovery Miles 10 580 Ships in 10 - 15 working days

Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy's devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering the latest threats Includes proof-of-concept code stored on the GitHub repository Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides

A Guide to Kernel Exploitation - Attacking the Core (Paperback): Enrico Perla, Massimiliano Oldani A Guide to Kernel Exploitation - Attacking the Core (Paperback)
Enrico Perla, Massimiliano Oldani
R1,061 R883 Discovery Miles 8 830 Save R178 (17%) Ships in 10 - 15 working days

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
Covers a range of operating system families - UNIX derivatives, Mac OS X, WindowsDetails common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditionsDelivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

Hacker's Delight (Hardcover, 2nd edition): Henry Warren Hacker's Delight (Hardcover, 2nd edition)
Henry Warren
R1,240 R1,033 Discovery Miles 10 330 Save R207 (17%) Ships in 5 - 10 working days

In "Hacker's Delight, Second Edition," Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren's hacks are eminently practical, but they're also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.
Extensive additions in this edition include A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code A new chapter on error correcting codes (ECC), including routines for the Hamming code More coverage of integer division by constants, including methods using only shifts and adds Computing remainders without computing a quotient More coverage of population count and counting leading zeros Array population count New algorithms for compress and expand An LRU algorithm Floating-point to/from integer conversions Approximate floating-point reciprocal square root routine A gallery of graphs of discrete functions Now with exercises and answers

Cyber Victimology - Decoding Cyber-Crime Victimisation (Hardcover): Debarati Halder Cyber Victimology - Decoding Cyber-Crime Victimisation (Hardcover)
Debarati Halder
R4,483 Discovery Miles 44 830 Ships in 10 - 15 working days

Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R972 Discovery Miles 9 720 Ships in 10 - 15 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Cybersecurity All-in-One For Dummies (Paperback): Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs Cybersecurity All-in-One For Dummies (Paperback)
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
R899 R771 Discovery Miles 7 710 Save R128 (14%) Ships in 5 - 10 working days

Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization. Explore the basics of cybersecurity at home and in business Learn how to secure your devices, data, and cloud-based assets Test your security to find holes and vulnerabilities before hackers do Create a culture of cybersecurity throughout an entire organization This For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.

Delusive Speech In The Sharing Economy - Scam Inc (Hardcover): Julie Reid Delusive Speech In The Sharing Economy - Scam Inc (Hardcover)
Julie Reid
R4,483 Discovery Miles 44 830 Ships in 10 - 15 working days

In this examination of how the rise of online sharing economy platforms has facilitated online crime, this book shows how, while marketed as trustworthy peer-to-peer services, these platforms are highly vulnerable to misuse by scammers and are used for the dissemination of delusive speech.

The analysis centres around the concept of delusive speech, a sub-set of disinformation, designed to deceive and motivate by criminal intent. Looking beyond the economic and disruptive impacts of sharing economy platforms like Uber, Airbnb, and others, this book situates these Big Tech giants as mass communication channels that are frequently misused by bad actors to distribute dangerous content globally. Drawing from over 600 cases of victims lured into scams or physical danger via misleading Airbnb listings, the book provides a detailed case study exposing Airbnb's failure to establish legitimate safety measures despite branding its platform as a 'community of trust'. Incorporating netnography and thematic analysis, the author theorises the deceptive semiotic structure of delusive speech and evaluates practical mechanisms Airbnb could employ to prevent scams and crime on its platform.

With a global audience including researchers in communication and media studies, digital media, and media industries, as well as tech journalists, Silicon Valley critics, policymakers, and digital rights advocates, this book unmasks how sharing economy giants like Airbnb contribute to an epidemic of online deception causing real-world harm.

Data Thieves in Action - Examining the International Market for Stolen Personal Information (Hardcover, 1st ed. 2016): Thomas... Data Thieves in Action - Examining the International Market for Stolen Personal Information (Hardcover, 1st ed. 2016)
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
R1,929 Discovery Miles 19 290 Ships in 10 - 15 working days

This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Using data from multiple English and Russian language web forums, the authors identify the range of products sold in these active on-line marketplaces and the prospective profits earned by these actors. The social organization of these markets is analysed using sociological theory to understand the sophistication of the markets. Social network analyses of the relational networks of participants are also utilised to examine their sophistication and structure. In doing so, this work will contribute to the development of cybercrime studies, and will appeal to both social and computer scientists alike with an interest in the human aspects of cybercrime.

Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition): Edward Wilding Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition)
Edward Wilding
R4,515 Discovery Miles 45 150 Ships in 10 - 15 working days

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: c preventing computer fraud, IP theft and systems sabotage c adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse c securing information - in both electronic and hard copy form c understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes c dealing with catastrophic risk c best-practice for monitoring and securing office and wireless networks c responding to attempted extortion and malicious information leaks c conducting covert operations and forensic investigations c securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New): Susan Young, Dave Aitel The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New)
Susan Young, Dave Aitel
R3,991 Discovery Miles 39 910 Ships in 10 - 15 working days

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Security and Control in Information Systems - A Guide for Business and Accounting (Paperback): Andrew Hawker Security and Control in Information Systems - A Guide for Business and Accounting (Paperback)
Andrew Hawker
R2,358 Discovery Miles 23 580 Ships in 10 - 15 working days


Contents:
Introduction Part I:Threats and Risks 1.Information under Threat 2.Risk Appraisal Part II:Controls for Internal Services 3.Computerised Controls: the Organizational Context 4.Access Controls 5.Controls within Business Processes Part III:Controls for Networked Services 6.Controls for Network Communications 7.Managing Security for Network Services 8.Controls for Local Area Networks and Small Systems Part IV:Business Continuity and Archiving 9.Business Continuity 10.Controls for Archived Data Part V:Computer Audit 11.Computer Audit:Introduction of New Systems 12.Computer Audit: Control of Existing Systems 13.Computer Forensics Part VI:Regulation and Standards 14.Security Standards and Codes of Practice.

Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn 1
R453 R338 Discovery Miles 3 380 Save R115 (25%) Ships in 10 - 15 working days

The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.

Fraud Investigation and Forensic Accounting in the Real World (Paperback): William L. Jennings Fraud Investigation and Forensic Accounting in the Real World (Paperback)
William L. Jennings
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forensic accounting assignment and fraud investigation. The book opens with an explanation of what happened to a company that was ensnared in a huge commodity purchasing scheme. Using his knowledge and experience gained over 40 years, the author illustrates that unexpected fraud occurrences can happen to any company, in any industry. Additionally, the author explains the current white-collar crime threats that organizations face every day, as well as legal issues that are often implicated in forensic accounting and fraud investigation projects. Electronic and non-electronic evidence gathering is also covered in detail with illustrative examples. One chapter is devoted entirely to the often misunderstood, but extremely important, subject of witness interviews. It provides the correct approach to the analysis and correlation of evidence in determining findings and conclusions of an investigation. Another chapter is devoted to proper report writing. The author provides detailed guidance on presenting findings to a variety of audiences, including management, a board, law enforcement, and at trials and hearings. It also covers proper techniques for measuring economic damages and concludes with a useful index. William L. Jennings is a Senior Director at Delta Consulting Group. He is responsible for providing forensic accounting, investigation, and asset recovery services to corporations, government agencies, attorneys, and their clients, as well as business controls consulting services to organizations. With more than 40 years of experience in public accounting and auditing, forensic accounting, business valuation, investigation, asset recovery, and business controls development, Mr. Jennings has worked on hundreds of forensic accounting and investigation assignments and he provides expert testimony.

A Fresh Look at Fraud - Theoretical and Applied Perspectives (Paperback): Yaniv Hanoch, Stacey Wood A Fresh Look at Fraud - Theoretical and Applied Perspectives (Paperback)
Yaniv Hanoch, Stacey Wood
R1,291 Discovery Miles 12 910 Ships in 10 - 15 working days

Features cross-disciplinary exchange among psychologists, criminologists, and computer scientists addressing fraud, scams, and financial abuse Includes discussion of the 'Next Frontiers' in research and important insights on how to create solutions

The SME Business Guide to Fraud Risk Management (Paperback): Robert James Chapman The SME Business Guide to Fraud Risk Management (Paperback)
Robert James Chapman
R1,132 Discovery Miles 11 320 Ships in 10 - 15 working days

* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events.

Economic Crime - From Conception to Response (Paperback): Mark Button, Branislav Hock, David Shepherd Economic Crime - From Conception to Response (Paperback)
Mark Button, Branislav Hock, David Shepherd
R1,259 Discovery Miles 12 590 Ships in 10 - 15 working days

This book offers a fresh approach to a range of pressing issues, emphasising the value of establishing economic crime as a sub-discipline within criminology. This will be essential reading for a range of more applied graduate courses across the UK and Europe on counter-fraud, money laundering, corruption, security management and financial crime investigation. Given the prominence of 'economic crime' amongst police forces, law enforcement agencies and government, this book has a secondary market amongst practitioners.

Digital Criminology - Crime and Justice in Digital Society (Paperback): Anastasia Powell, Gregory Stratton, Robin Cameron Digital Criminology - Crime and Justice in Digital Society (Paperback)
Anastasia Powell, Gregory Stratton, Robin Cameron
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday crimes. Digital Criminology: Crime and Justice in Digital Society is the first interdisciplinary scholarly investigation extending beyond traditional topics of cybercrime, policing and the law to consider the implications of digital society for public engagement with crime and justice movements. This book seeks to connect the disparate fields of criminology, sociology, legal studies, politics, media and cultural studies in the study of crime and justice. Drawing together intersecting conceptual frameworks, Digital Criminology examines conceptual, legal, political and cultural framings of crime, formal justice responses and informal citizen-led justice movements in our increasingly connected global and digital society. Building on case study examples from across Australia, Canada, Europe, China, the UK and the United States, Digital Criminology explores key questions including: What are the implications of an increasingly digital society for crime and justice? What effects will emergent technologies have for how we respond to crime and participate in crime debates? What will be the foundational shifts in criminological research and frameworks for understanding crime and justice in this technologically mediated context? What does it mean to be a 'just' digital citizen? How will digital communications and social networks enable new forms of justice and justice movements? Ultimately, the book advances the case for an emerging digital criminology: extending the practical and conceptual analyses of 'cyber' or 'e' crime beyond a focus foremost on the novelty, pathology and illegality of technology-enabled crimes, to understandings of online crime as inherently social. Twitter: @DigiCrimRMIT

The Human Factor of Cybercrime (Paperback): Rutger Leukfeldt, Thomas J. Holt The Human Factor of Cybercrime (Paperback)
Rutger Leukfeldt, Thomas J. Holt
R1,411 Discovery Miles 14 110 Ships in 10 - 15 working days

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019): Mohuya... Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019)
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J K Mandal
R4,075 Discovery Miles 40 750 Ships in 18 - 22 working days

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

Digital Piracy - A Global, Multidisciplinary Account (Paperback): Steven Caldwell Brown, Thomas Holt Digital Piracy - A Global, Multidisciplinary Account (Paperback)
Steven Caldwell Brown, Thomas Holt
R1,446 Discovery Miles 14 460 Ships in 10 - 15 working days

Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens. Bringing together perspectives from criminology, psychology, business, and adopting a morally neutral stance, this book offers a holistic overview of this growing phenomenon. It considers its cultural, commercial, and legal aspects, and brings together international research on a range of topics, such as copyright infringement, intellectual property, music publishing, movie piracy, and changes in consumer behaviour. This book offers a new perspective to the growing literature on cybercrime and digital security. This multi-disciplinary book is the first to bring together international research on digital piracy and will be key reading for researchers in the fields of criminology, psychology, law and business.

Security for Software Engineers (Paperback, 3rd Edition): James N. Helfrich Security for Software Engineers (Paperback, 3rd Edition)
James N. Helfrich
R1,024 Discovery Miles 10 240 Ships with 15 working days

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint.

Features:

Targets software engineering students - one of the only security texts to target this audience.

Focuses on the white-hat side of the security equation rather than the black-hat side.

Includes many practical and real-world examples that easily translate into the workplace.

Covers a one-semester undergraduate course.

Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry.

This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user’s information assets.

Table of Contents

Introduction to Security 0: Security for Software Engineers 1: Roles Unit 1: Attack Vectors 2: Classification of Attacks 3: Software Weapons 4: Social Engineering Unit 2: Code Hardening 5: Command Injection 6: Script Injection 7: Memory Injection 8: Threat Modeling 9: Mitigation Unit 3: Privacy 10: Authentication 11: Access Control 12: Encryption Appendices A: Arrays B: Function Pointers C: V-Tables D: Integers E: The Callstack F: The Heap G: Further Reading H: Works Cited I: Glossary J: Index

Cyber Strategy - Risk-Driven Security and Resiliency (Paperback): Carol A. Siegel, Mark Sweeney Cyber Strategy - Risk-Driven Security and Resiliency (Paperback)
Carol A. Siegel, Mark Sweeney
R1,295 Discovery Miles 12 950 Ships in 10 - 15 working days

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover): Suneeta Satpathy, Sachi Mohanty Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover)
Suneeta Satpathy, Sachi Mohanty
R2,466 Discovery Miles 24 660 Ships in 10 - 15 working days

Digital forensics has recently gained a notable development and become the most demanding area in today's information security requirement. This book investigates the areas of digital forensics, digital investigation and data analysis procedures as they apply to computer fraud and cybercrime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence. Big Data Analytics and Computing for Digital Forensic Investigations gives a contemporary view on the problems of information security. It presents the idea that protective mechanisms and software must be integrated along with forensic capabilities into existing forensic software using big data computing tools and techniques. Features Describes trends of digital forensics served for big data and the challenges of evidence acquisition Enables digital forensic investigators and law enforcement agencies to enhance their digital investigation capabilities with the application of data science analytics, algorithms and fusion technique This book is focused on helping professionals as well as researchers to get ready with next-generation security systems to mount the rising challenges of computer fraud and cybercrimes as well as with digital forensic investigations. Dr Suneeta Satpathy has more than ten years of teaching experience in different subjects of the Computer Science and Engineering discipline. She is currently working as an associate professor in the Department of Computer Science and Engineering, College of Bhubaneswar, affiliated with Biju Patnaik University and Technology, Odisha. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis and decision mining. Dr Sachi Nandan Mohanty is an associate professor in the Department of Computer Science and Engineering at ICFAI Tech, ICFAI Foundation for Higher Education, Hyderabad, India. His research interests include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition and computational intelligence.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Human Engineering in Stereoscopic…
Daniel B. Diner, Derek H. Fender Hardcover R2,761 Discovery Miles 27 610
Court Of The Vampire Queen
Katee Robert Paperback R298 R274 Discovery Miles 2 740
3D Face Processing - Modeling, Analysis…
Zhen Wen, Thomas S. Huang Hardcover R5,226 Discovery Miles 52 260
History in Mathematics Education - The…
John Fauvel, J. A. Van Maanen Hardcover R4,257 Discovery Miles 42 570
Six Scorched Roses
Carissa Broadbent Paperback  (1)
R385 R349 Discovery Miles 3 490
Life Orientation For South African…
Mirna Nel Paperback R735 Discovery Miles 7 350
White Lights
Lauren Kate Paperback R390 R289 Discovery Miles 2 890
Cyclic Polymers
E. R. Semlyen Hardcover R5,585 Discovery Miles 55 850
Prime Mathematics Teacher's Guide 3a
Scholastic Paperback R988 R593 Discovery Miles 5 930
Starside
Alex Aster Paperback R470 R360 Discovery Miles 3 600

 

Partners