![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.
The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.
"The International Handbook of Computer Security" is designed to
help information systems/computer professionals as well as business
executives protect computer systems and data from a myriad of
internal and external threats. The book addresses a wide range of
computer security issues. It is intended to provide practical and
thorough guidance in what often seems a quagmire of computers,
technology, networks, and software.
Master CEH v11 and identify your weak spots As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. CEH v11 Certified Ethical Hacker Study Guide and Practice Tests Set provides you with all of the technical review you need of CEH skills PLUS SEVEN practice tests to prove your readiness for exam day. About the CEH v11 Certified Ethical Hacker Study Guide The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, TWO full-length practice exams, electronic flashcards, and a glossary of key terms About the CEH v11 Certified Ethical Hacker Practice Tests CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. FIVE MORE complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day
"White-collar criminals continue to pick our pockets to the tune of $300 billion every year. These 'socially acceptable' criminals rob more from companies and individuals with a pen or key stroke than a street thug can plunder with a high-powered pistol." —from the Introduction In Masters of Deception, former special agent and intelligence officer Louis Mizell addresses the growing problem of white-collar crime in America. Using actual cases, Mizell exposes scores of perpetrators and their modus operandi, and offers invaluable advice on what to look for, how to avoid being a victim, and how to fight back. Praise for Louis Mizell and Masters of Deception "Mizell stands out as a true expert in crime and terrorism who earned his title fighting the bad guys in back alleys, courts, corporate suites, and the new global economy. No one else out there can match his knowledge of what the bad guys are doing and how." —James Grady, author of Six Days of the Condor and White Flame "Masters of Deception exposes little known facts that should be revealed to the unsuspecting public. Mizell may well be the next Ralph Nader in exposing the many ways innocent people are victimized by white-collar crime." —Dr. Richard Ward, Associate Chancellor and Professor of Criminal Justice, University of Chicago at Illinois White-collar crime is an alarming epidemic that has reached every big city and small town in America. Invading all sectors, from health care and religion to law and education, it claims millions of victims, and bilks taxpayers out of billions of dollars every year. In Masters of Deception, top crime expert Louis Mizell addresses this serious—and costly—problem, exposing some of the most notorious offenders, and providing precautionary measures everyone should take to avoid being "taken to the cleaners." Leaving no get-rich-quick stone unturned, white-collar criminals strike from every angle. Whether they're doctors overbilling patients, charity workers pocketing donations, or lawyers abusing powers of attorney, their fraudulent practices cost individuals, companies, and institutions billions of dollars. Consider the following:
In Masters of Deception, Mizell explores the full spectrum of white-collar crime and the misuse of power by professionals we trust, including health care, business, education, and religion. He reveals hundreds of actual cases, from local crimes to such highly publicized incidents as the PTL scandal. With his experienced analytical eye, Mizell is able to spot new and emerging trends and pinpoint signs to look for in identifying potential cons. Sharing his expertise and insight as a former special agent and intelligence officer, Mizell also offers proven tips for fighting back—specific to each sector—as well as an extensive list of contacts for receiving further information, getting help, or reporting a crime. And anyone who believes that white- collar crime is nonviolent will be shocked to learn that crime in the suites causes as much death and injury as crime in the streets. Masters of Deception is a timely and authoritative book that will not only raise awareness about white-collar crime, but also allow readers "to empower themselves with enough knowledge to never be a victim."
Willie Sutton, a notorious American bank robber of fifty years ago, was once asked why he persisted in robbing banks. "Because that's where the money is," he is said to have replied. The theory that crime follows opportunity has become established wisdom in criminology; opportunity reduction has become one of the fundamental principles of crime prevention. "The enormous benefits of telecommunications are not without cost." It could be argued that this quotation from Crime in the Digital Age, is a dramatic understatement. Grabosky and Smith advise us that the criminal opportunities which accompany these newest technological changes include: illegal interception of telecommunications; electronic vandalism and terrorism; theft of telecommunications services; telecommunications piracy; transmission of pornographic and other offensive material; telemarketing fraud; electronic funds transfer crime; electronic money laundering; and finally, telecommunications in furtherance of other criminal conspiracies. However, although digitization has facilitated a great deal of criminal activity, the authors suggest that technology also provides the means to prevent and detect such crimes. Moreover, the varied nature of these crimes defies a single policy solution. Grabosky and Smith take us through this electronic minefield and discuss the issues facing Australia as well as the international community and law enforcement agencies.
Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem
The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies.
This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an overview of the key principles, concepts and research literature associated with crime prevention, and discusses the interventions most commonly applied to crime problems. The authors review the theoretical underpinnings of these and analyses evidence for their efficacy. Cybercrime Prevention is split into three sections which examine primary prevention, secondary prevention and tertiary prevention. It provides a thorough discussion of what works and what does not, and offers a formulaic account of how traditional crime prevention interventions can be reimagined to apply to the digital realm.
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.
Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.
'Cyber war is coming,' announced a landmark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the 'fifth domain' of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain?Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure?How serious is the threat of 'pure' cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?
HIGHLY COMMENDED: Business Book Awards 2022 - Specialist Business Book Crypto is big news. You may be an existing user yourself or have friends that laud its promise of getting rich fast. Arm yourself with the knowledge to come out on top in the crypto wars. If thousands of people can lose billions of dollars in OneCoin, masterminded by the now infamous Missing Cryptoqueen made famous by the BBC's podcast series and called 'one of the biggest scams in history' by The Times, what makes you think your money is safe? OneCoin isn't alone. Crypto Wars reveals how some of the most shocking scams affected millions of innocent people all around the world with everything from religious leaders to celebrities involved. In this book, you get exclusive access to the back story of the most extreme Ponzi schemes, the most bizarre hoaxes and brutal exit strategies from some of the biggest charlatans of crypto. Crypto expert and educator, Erica Stanford, will show you how market-wide manipulation schemes, unregulated processes and a new collection of technologies that are often misunderstood, have been exploited to create the wild west of crypto, run by some less than reputable characters. From OneCoin to PonziCoin to Trumpcoin and everything in between, Crypto Wars uncovers the scandals, unpicks the system behind them and allows you to better understand a new technology that has the potential to revolutionize banking and our world for the better.
In this examination of how the rise of online sharing economy platforms has facilitated online crime, this book shows how, while marketed as trustworthy peer-to-peer services, these platforms are highly vulnerable to misuse by scammers and are used for the dissemination of delusive speech. The analysis centres around the concept of delusive speech, a sub-set of disinformation, designed to deceive and motivate by criminal intent. Looking beyond the economic and disruptive impacts of sharing economy platforms like Uber, Airbnb, and others, this book situates these Big Tech giants as mass communication channels that are frequently misused by bad actors to distribute dangerous content globally. Drawing from over 600 cases of victims lured into scams or physical danger via misleading Airbnb listings, the book provides a detailed case study exposing Airbnb's failure to establish legitimate safety measures despite branding its platform as a 'community of trust'. Incorporating netnography and thematic analysis, the author theorises the deceptive semiotic structure of delusive speech and evaluates practical mechanisms Airbnb could employ to prevent scams and crime on its platform. With a global audience including researchers in communication and media studies, digital media, and media industries, as well as tech journalists, Silicon Valley critics, policymakers, and digital rights advocates, this book unmasks how sharing economy giants like Airbnb contribute to an epidemic of online deception causing real-world harm.
The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.
Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: c preventing computer fraud, IP theft and systems sabotage c adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse c securing information - in both electronic and hard copy form c understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes c dealing with catastrophic risk c best-practice for monitoring and securing office and wireless networks c responding to attempted extortion and malicious information leaks c conducting covert operations and forensic investigations c securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems. |
![]() ![]() You may like...
3D Point Cloud Analysis - Traditional…
Shan Liu, Min Zhang, …
Hardcover
R3,357
Discovery Miles 33 570
Algorithms and Data Structures - 16th…
Zachary Friggstad, Joerg-Rudiger Sack, …
Paperback
R1,615
Discovery Miles 16 150
Time-dependent Problems in Imaging and…
Barbara Kaltenbacher, Thomas Schuster, …
Hardcover
R4,265
Discovery Miles 42 650
Optimization Techniques in Computer…
Mongi A. Abidi, Andrei V. Gribok, …
Hardcover
R4,314
Discovery Miles 43 140
Cardiovascular and Coronary Artery…
Ayman S. El-Baz, Jasjit S. Suri
Paperback
R4,040
Discovery Miles 40 400
Computational Diffusion MRI - MICCAI…
Elisenda Bonet-Carne, Jana Hutter, …
Hardcover
R4,359
Discovery Miles 43 590
High Efficiency Video Coding (HEVC…
Vivienne Sze, Madhukar Budagavi, …
Hardcover
R4,602
Discovery Miles 46 020
|