0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (29)
  • R500+ (297)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New): Susan Young, Dave Aitel The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New)
Susan Young, Dave Aitel
R3,991 Discovery Miles 39 910 Ships in 10 - 15 working days

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

National Cyber Emergencies - The Return to Civil Defence (Hardcover): Greg Austin National Cyber Emergencies - The Return to Civil Defence (Hardcover)
Greg Austin
R4,494 Discovery Miles 44 940 Ships in 10 - 15 working days

This book documents and explains civil defence preparations for national cyber emergencies in conditions of both peace and war. The volume analyses the escalating sense of crisis around state-sponsored cyber attacks that has emerged since 2015, when the United States first declared a national emergency in cyberspace. It documents a shift in thinking in the USA, from cooperative resilience-oriented approaches at national level to more highly regulated, state-led civil defence initiatives. Although the American response has been mirrored in other countries, the shift is far from universal. Civil defence strategies have come into play but the global experience of that has not been consistent or even that successful. Containing contributions from well-placed scholars and practitioners, this volume reviews a selection of national experiences (from the USA, Australia, India, China, Estonia, and Finland) and a number of key thematic issues (information weapons, alliance coordination, and attack simulations). These demonstrate a disconnect between the deepening sense of vulnerability and the availability of viable solutions at the national level. Awareness of this gap may ultimately lead to more internationally oriented cooperation, but the trend for now appears to be more conflictual and rooted in a growing sense of insecurity. This book will be of much interest to students of cyber security, homeland security, disaster management, and international relations, as well as practitioners and policy-makers.

Sex and the Internet - A Guide Book for Clinicians (Paperback): Al Cooper Sex and the Internet - A Guide Book for Clinicians (Paperback)
Al Cooper
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days


This groundbreaking book is the first of its kind to thoroughly explore the topic of cybersex and the effects of Internet use on sexuality. Focusing on treatment and assessment issues and the clinical implications of cybersex, this authoritative volume provides mental health professionals with an analysis of the most recent empirical evidence along with research specific to the impact of Internet use on couples and families, gay men, people with disabilities, children and the workplace. Edited by one of the leading researchers, clinicians, and authors in the emerging field of sex and the Internet, this book addresses the growing complexity of Internet sex issues and their impact on psychological functioning.

Related link: Free Email Alerting

Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback):... Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback)
Thomas R. Peltier
R2,952 Discovery Miles 29 520 Ships in 10 - 15 working days

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.

Digital Music Distribution - The Sociology of Online Music Streams (Paperback): Hendrik Storstein Spilker Digital Music Distribution - The Sociology of Online Music Streams (Paperback)
Hendrik Storstein Spilker
R1,434 Discovery Miles 14 340 Ships in 10 - 15 working days

The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies.

National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover): Sybil... National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Hardcover)
Sybil Sharpe
R4,481 Discovery Miles 44 810 Ships in 10 - 15 working days

There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.

Botnets - Architectures, Countermeasures, and Challenges (Hardcover): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Hardcover)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R3,806 Discovery Miles 38 060 Ships in 10 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

The International Handbook of Computer Security (Hardcover): Jae Shim, Anique A. Qureshi, Joel G Siegel The International Handbook of Computer Security (Hardcover)
Jae Shim, Anique A. Qureshi, Joel G Siegel
R4,785 Discovery Miles 47 850 Ships in 10 - 15 working days

"The International Handbook of Computer Security" is designed to help information systems/computer professionals as well as business executives protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in what often seems a quagmire of computers, technology, networks, and software.
Major topics discussed are: security policies; physical security procedures; data preservation and protection; hardware and software protection and security; personnel management and security; network security, internal and external systems; contingency planning; legal and auditing planning and control.

Hackers - Crime and the Digital Sublime (Paperback, New): Paul Taylor Hackers - Crime and the Digital Sublime (Paperback, New)
Paul Taylor
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days


The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if we are to make the most of society's high-tech meddlers.

Hackers - Crime and the Digital Sublime (Hardcover): Paul Taylor Hackers - Crime and the Digital Sublime (Hardcover)
Paul Taylor
R4,637 Discovery Miles 46 370 Ships in 10 - 15 working days


The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if we are to make the most of society's high-tech meddlers.

The Human Factor of Cybercrime (Paperback): Rutger Leukfeldt, Thomas J. Holt The Human Factor of Cybercrime (Paperback)
Rutger Leukfeldt, Thomas J. Holt
R1,386 Discovery Miles 13 860 Ships in 9 - 17 working days

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

Crime in the Digital Age - Controlling Telecommunications and Cyberspace Illegalities (Paperback): Russell Smith Crime in the Digital Age - Controlling Telecommunications and Cyberspace Illegalities (Paperback)
Russell Smith
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

Willie Sutton, a notorious American bank robber of fifty years ago, was once asked why he persisted in robbing banks. "Because that's where the money is," he is said to have replied. The theory that crime follows opportunity has become established wisdom in criminology; opportunity reduction has become one of the fundamental principles of crime prevention.

"The enormous benefits of telecommunications are not without cost." It could be argued that this quotation from Crime in the Digital Age, is a dramatic understatement. Grabosky and Smith advise us that the criminal opportunities which accompany these newest technological changes include: illegal interception of telecommunications; electronic vandalism and terrorism; theft of telecommunications services; telecommunications piracy; transmission of pornographic and other offensive material; telemarketing fraud; electronic funds transfer crime; electronic money laundering; and finally, telecommunications in furtherance of other criminal conspiracies.

However, although digitization has facilitated a great deal of criminal activity, the authors suggest that technology also provides the means to prevent and detect such crimes. Moreover, the varied nature of these crimes defies a single policy solution. Grabosky and Smith take us through this electronic minefield and discuss the issues facing Australia as well as the international community and law enforcement agencies.

A Guide to Kernel Exploitation - Attacking the Core (Paperback): Enrico Perla, Massimiliano Oldani A Guide to Kernel Exploitation - Attacking the Core (Paperback)
Enrico Perla, Massimiliano Oldani
R1,061 R883 Discovery Miles 8 830 Save R178 (17%) Ships in 10 - 15 working days

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
Covers a range of operating system families - UNIX derivatives, Mac OS X, WindowsDetails common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditionsDelivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R972 Discovery Miles 9 720 Ships in 10 - 15 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Delusive Speech In The Sharing Economy - Scam Inc (Hardcover): Julie Reid Delusive Speech In The Sharing Economy - Scam Inc (Hardcover)
Julie Reid
R4,483 Discovery Miles 44 830 Ships in 10 - 15 working days

In this examination of how the rise of online sharing economy platforms has facilitated online crime, this book shows how, while marketed as trustworthy peer-to-peer services, these platforms are highly vulnerable to misuse by scammers and are used for the dissemination of delusive speech.

The analysis centres around the concept of delusive speech, a sub-set of disinformation, designed to deceive and motivate by criminal intent. Looking beyond the economic and disruptive impacts of sharing economy platforms like Uber, Airbnb, and others, this book situates these Big Tech giants as mass communication channels that are frequently misused by bad actors to distribute dangerous content globally. Drawing from over 600 cases of victims lured into scams or physical danger via misleading Airbnb listings, the book provides a detailed case study exposing Airbnb's failure to establish legitimate safety measures despite branding its platform as a 'community of trust'. Incorporating netnography and thematic analysis, the author theorises the deceptive semiotic structure of delusive speech and evaluates practical mechanisms Airbnb could employ to prevent scams and crime on its platform.

With a global audience including researchers in communication and media studies, digital media, and media industries, as well as tech journalists, Silicon Valley critics, policymakers, and digital rights advocates, this book unmasks how sharing economy giants like Airbnb contribute to an epidemic of online deception causing real-world harm.

Data Thieves in Action - Examining the International Market for Stolen Personal Information (Hardcover, 1st ed. 2016): Thomas... Data Thieves in Action - Examining the International Market for Stolen Personal Information (Hardcover, 1st ed. 2016)
Thomas J. Holt, Olga Smirnova, Yi-Ting Chua
R1,929 Discovery Miles 19 290 Ships in 10 - 15 working days

This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Using data from multiple English and Russian language web forums, the authors identify the range of products sold in these active on-line marketplaces and the prospective profits earned by these actors. The social organization of these markets is analysed using sociological theory to understand the sophistication of the markets. Social network analyses of the relational networks of participants are also utilised to examine their sophistication and structure. In doing so, this work will contribute to the development of cybercrime studies, and will appeal to both social and computer scientists alike with an interest in the human aspects of cybercrime.

Principles of Cybercrime (Hardcover, 2nd Revised edition): Jonathan Clough Principles of Cybercrime (Hardcover, 2nd Revised edition)
Jonathan Clough
R2,664 Discovery Miles 26 640 Ships in 10 - 15 working days

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.

Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition): Edward Wilding Information Risk and Security - Preventing and Investigating Workplace Computer Crime (Hardcover, New edition)
Edward Wilding
R4,515 Discovery Miles 45 150 Ships in 10 - 15 working days

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: c preventing computer fraud, IP theft and systems sabotage c adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse c securing information - in both electronic and hard copy form c understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes c dealing with catastrophic risk c best-practice for monitoring and securing office and wireless networks c responding to attempted extortion and malicious information leaks c conducting covert operations and forensic investigations c securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.

Security and Control in Information Systems - A Guide for Business and Accounting (Paperback): Andrew Hawker Security and Control in Information Systems - A Guide for Business and Accounting (Paperback)
Andrew Hawker
R2,358 Discovery Miles 23 580 Ships in 10 - 15 working days


Contents:
Introduction Part I:Threats and Risks 1.Information under Threat 2.Risk Appraisal Part II:Controls for Internal Services 3.Computerised Controls: the Organizational Context 4.Access Controls 5.Controls within Business Processes Part III:Controls for Networked Services 6.Controls for Network Communications 7.Managing Security for Network Services 8.Controls for Local Area Networks and Small Systems Part IV:Business Continuity and Archiving 9.Business Continuity 10.Controls for Archived Data Part V:Computer Audit 11.Computer Audit:Introduction of New Systems 12.Computer Audit: Control of Existing Systems 13.Computer Forensics Part VI:Regulation and Standards 14.Security Standards and Codes of Practice.

Cyber Strategy - Risk-Driven Security and Resiliency (Paperback): Carol A. Siegel, Mark Sweeney Cyber Strategy - Risk-Driven Security and Resiliency (Paperback)
Carol A. Siegel, Mark Sweeney
R1,239 Discovery Miles 12 390 Ships in 10 - 15 working days

Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. Tools utilized include: Key Risk Indicators (KRI) and Key Performance Indicators (KPI) National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Target State Maturity interval mapping per initiative Comparisons of current and target state business goals and critical success factors A quantitative NIST-based risk assessment of initiative technology components Responsible, Accountable, Consulted, Informed (RACI) diagrams for Cyber Steering Committee tasks and Governance Boards' approval processes Swimlanes, timelines, data flow diagrams (inputs, resources, outputs), progress report templates, and Gantt charts for project management The last chapter provides downloadable checklists, tables, data flow diagrams, figures, and assessment tools to help develop your company's cybersecurity and cyber resiliency strategic plan.

Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover): Suneeta Satpathy, Sachi Mohanty Big Data Analytics and Computing for Digital Forensic Investigations (Hardcover)
Suneeta Satpathy, Sachi Mohanty
R2,466 Discovery Miles 24 660 Ships in 10 - 15 working days

Digital forensics has recently gained a notable development and become the most demanding area in today's information security requirement. This book investigates the areas of digital forensics, digital investigation and data analysis procedures as they apply to computer fraud and cybercrime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence. Big Data Analytics and Computing for Digital Forensic Investigations gives a contemporary view on the problems of information security. It presents the idea that protective mechanisms and software must be integrated along with forensic capabilities into existing forensic software using big data computing tools and techniques. Features Describes trends of digital forensics served for big data and the challenges of evidence acquisition Enables digital forensic investigators and law enforcement agencies to enhance their digital investigation capabilities with the application of data science analytics, algorithms and fusion technique This book is focused on helping professionals as well as researchers to get ready with next-generation security systems to mount the rising challenges of computer fraud and cybercrimes as well as with digital forensic investigations. Dr Suneeta Satpathy has more than ten years of teaching experience in different subjects of the Computer Science and Engineering discipline. She is currently working as an associate professor in the Department of Computer Science and Engineering, College of Bhubaneswar, affiliated with Biju Patnaik University and Technology, Odisha. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis and decision mining. Dr Sachi Nandan Mohanty is an associate professor in the Department of Computer Science and Engineering at ICFAI Tech, ICFAI Foundation for Higher Education, Hyderabad, India. His research interests include data mining, big data analysis, cognitive science, fuzzy decision-making, brain-computer interface, cognition and computational intelligence.

CEH Certified Ethical Hacker Bundle, Fifth Edition (Mixed media product, 5th edition): Matt Walker CEH Certified Ethical Hacker Bundle, Fifth Edition (Mixed media product, 5th edition)
Matt Walker
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions. This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they've learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams. This edition features up-to-date coverage of all nine domains of the CEH v11 exam and the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaingin access and clearing tracks. In all, the bundle includes more than 900 accurate questions with detailed answer explanations Online content includes test engine that provides full-length practice exams and customizable quizzes by chapter or exam domain This bundle is 33% cheaper than buying the two books separately

Fraud Investigation and Forensic Accounting in the Real World (Paperback): William L. Jennings Fraud Investigation and Forensic Accounting in the Real World (Paperback)
William L. Jennings
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forensic accounting assignment and fraud investigation. The book opens with an explanation of what happened to a company that was ensnared in a huge commodity purchasing scheme. Using his knowledge and experience gained over 40 years, the author illustrates that unexpected fraud occurrences can happen to any company, in any industry. Additionally, the author explains the current white-collar crime threats that organizations face every day, as well as legal issues that are often implicated in forensic accounting and fraud investigation projects. Electronic and non-electronic evidence gathering is also covered in detail with illustrative examples. One chapter is devoted entirely to the often misunderstood, but extremely important, subject of witness interviews. It provides the correct approach to the analysis and correlation of evidence in determining findings and conclusions of an investigation. Another chapter is devoted to proper report writing. The author provides detailed guidance on presenting findings to a variety of audiences, including management, a board, law enforcement, and at trials and hearings. It also covers proper techniques for measuring economic damages and concludes with a useful index. William L. Jennings is a Senior Director at Delta Consulting Group. He is responsible for providing forensic accounting, investigation, and asset recovery services to corporations, government agencies, attorneys, and their clients, as well as business controls consulting services to organizations. With more than 40 years of experience in public accounting and auditing, forensic accounting, business valuation, investigation, asset recovery, and business controls development, Mr. Jennings has worked on hundreds of forensic accounting and investigation assignments and he provides expert testimony.

A Fresh Look at Fraud - Theoretical and Applied Perspectives (Paperback): Yaniv Hanoch, Stacey Wood A Fresh Look at Fraud - Theoretical and Applied Perspectives (Paperback)
Yaniv Hanoch, Stacey Wood
R1,291 Discovery Miles 12 910 Ships in 10 - 15 working days

Features cross-disciplinary exchange among psychologists, criminologists, and computer scientists addressing fraud, scams, and financial abuse Includes discussion of the 'Next Frontiers' in research and important insights on how to create solutions

Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Paperback): Erica Stanford Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Paperback)
Erica Stanford
R461 Discovery Miles 4 610 Ships in 10 - 15 working days

HIGHLY COMMENDED: Business Book Awards 2022 - Specialist Business Book Crypto is big news. You may be an existing user yourself or have friends that laud its promise of getting rich fast. Arm yourself with the knowledge to come out on top in the crypto wars. If thousands of people can lose billions of dollars in OneCoin, masterminded by the now infamous Missing Cryptoqueen made famous by the BBC's podcast series and called 'one of the biggest scams in history' by The Times, what makes you think your money is safe? OneCoin isn't alone. Crypto Wars reveals how some of the most shocking scams affected millions of innocent people all around the world with everything from religious leaders to celebrities involved. In this book, you get exclusive access to the back story of the most extreme Ponzi schemes, the most bizarre hoaxes and brutal exit strategies from some of the biggest charlatans of crypto. Crypto expert and educator, Erica Stanford, will show you how market-wide manipulation schemes, unregulated processes and a new collection of technologies that are often misunderstood, have been exploited to create the wild west of crypto, run by some less than reputable characters. From OneCoin to PonziCoin to Trumpcoin and everything in between, Crypto Wars uncovers the scandals, unpicks the system behind them and allows you to better understand a new technology that has the potential to revolutionize banking and our world for the better.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyber Crime and Cyber Terrorism…
Babak Akhgar, Andrew Staniforth, … Paperback R1,110 Discovery Miles 11 100
Computer Crimes and Digital…
Ian Walden Hardcover  (1)
R5,062 Discovery Miles 50 620
Computer and Intrusion Forensics
George Mohay, Alison Anderson, … Hardcover R2,583 Discovery Miles 25 830
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda Paperback R1,208 Discovery Miles 12 080
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R474 Discovery Miles 4 740
Seven Deadliest Web Application Attacks
Mike Shema Paperback R577 Discovery Miles 5 770
Advanced Persistent Threat…
Eric Cole Paperback R1,111 Discovery Miles 11 110
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650

 

Partners