0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (29)
  • R500+ (297)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Digital Criminology - Crime and Justice in Digital Society (Paperback): Anastasia Powell, Gregory Stratton, Robin Cameron Digital Criminology - Crime and Justice in Digital Society (Paperback)
Anastasia Powell, Gregory Stratton, Robin Cameron
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday crimes. Digital Criminology: Crime and Justice in Digital Society is the first interdisciplinary scholarly investigation extending beyond traditional topics of cybercrime, policing and the law to consider the implications of digital society for public engagement with crime and justice movements. This book seeks to connect the disparate fields of criminology, sociology, legal studies, politics, media and cultural studies in the study of crime and justice. Drawing together intersecting conceptual frameworks, Digital Criminology examines conceptual, legal, political and cultural framings of crime, formal justice responses and informal citizen-led justice movements in our increasingly connected global and digital society. Building on case study examples from across Australia, Canada, Europe, China, the UK and the United States, Digital Criminology explores key questions including: What are the implications of an increasingly digital society for crime and justice? What effects will emergent technologies have for how we respond to crime and participate in crime debates? What will be the foundational shifts in criminological research and frameworks for understanding crime and justice in this technologically mediated context? What does it mean to be a 'just' digital citizen? How will digital communications and social networks enable new forms of justice and justice movements? Ultimately, the book advances the case for an emerging digital criminology: extending the practical and conceptual analyses of 'cyber' or 'e' crime beyond a focus foremost on the novelty, pathology and illegality of technology-enabled crimes, to understandings of online crime as inherently social. Twitter: @DigiCrimRMIT

Google Hacking for Penetration Testers (Paperback, 3rd edition): Johnny Long, Bill Gardner, Justin Brown Google Hacking for Penetration Testers (Paperback, 3rd edition)
Johnny Long, Bill Gardner, Justin Brown
R1,273 Discovery Miles 12 730 Ships in 10 - 15 working days

Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

Street Coder (Paperback): Sedat Kapanoglu Street Coder (Paperback)
Sedat Kapanoglu
R1,246 Discovery Miles 12 460 Ships in 10 - 15 working days

Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.

Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019): Mohuya... Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019)
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J K Mandal
R4,075 Discovery Miles 40 750 Ships in 18 - 22 working days

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

Digital Piracy - A Global, Multidisciplinary Account (Paperback): Steven Caldwell Brown, Thomas Holt Digital Piracy - A Global, Multidisciplinary Account (Paperback)
Steven Caldwell Brown, Thomas Holt
R1,446 Discovery Miles 14 460 Ships in 10 - 15 working days

Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens. Bringing together perspectives from criminology, psychology, business, and adopting a morally neutral stance, this book offers a holistic overview of this growing phenomenon. It considers its cultural, commercial, and legal aspects, and brings together international research on a range of topics, such as copyright infringement, intellectual property, music publishing, movie piracy, and changes in consumer behaviour. This book offers a new perspective to the growing literature on cybercrime and digital security. This multi-disciplinary book is the first to bring together international research on digital piracy and will be key reading for researchers in the fields of criminology, psychology, law and business.

Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques (Paperback): V Troia Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques (Paperback)
V Troia
R1,039 R889 Discovery Miles 8 890 Save R150 (14%) Ships in 9 - 17 working days

The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: Through the eyes of the author who has several years of experience in the subject. Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets. Through the eyes of industry leaders. This book is ideal for: Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data.

Cyber Mercenaries - The State, Hackers, and Power (Hardcover): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Hardcover)
Tim Maurer
R1,874 R1,710 Discovery Miles 17 100 Save R164 (9%) Ships in 10 - 15 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn 1
R453 R427 Discovery Miles 4 270 Save R26 (6%) Ships in 10 - 15 working days

The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.

Hands-on Incident Response and Digital Forensics (Paperback): Mike Sheward Hands-on Incident Response and Digital Forensics (Paperback)
Mike Sheward
R1,197 Discovery Miles 11 970 Ships in 18 - 22 working days

Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout.

Cyber War versus Cyber Realities - Cyber Conflict in the International System (Hardcover): Brandon Valeriano, Ryan C Maness Cyber War versus Cyber Realities - Cyber Conflict in the International System (Hardcover)
Brandon Valeriano, Ryan C Maness
R1,079 Discovery Miles 10 790 Ships in 10 - 15 working days

In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism.

Advanced Persistent Security - A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction... Advanced Persistent Security - A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies (Paperback)
Ira Winkler, Araceli Treu Gomes
R1,032 Discovery Miles 10 320 Ships in 10 - 15 working days

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.

Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.): Sagar Ajay Rahalkar Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.)
Sagar Ajay Rahalkar
R1,650 Discovery Miles 16 500 Ships in 18 - 22 working days

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

US National Cybersecurity - International Politics, Concepts and Organization (Hardcover): Damien Van Puyvelde, Aaron Brantly US National Cybersecurity - International Politics, Concepts and Organization (Hardcover)
Damien Van Puyvelde, Aaron Brantly
R4,911 Discovery Miles 49 110 Ships in 10 - 15 working days

This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.

Intelligent Mobile Malware Detection (Hardcover): Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran Intelligent Mobile Malware Detection (Hardcover)
Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran
R2,347 Discovery Miles 23 470 Ships in 10 - 15 working days

Unique selling point: * This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. * This book will be useful for researchers, students, developers and security analysts to know how malware behavior represented in the form of system call graphs can effectively detect Android malware. * The malware detection mechanisms in this book can be integrated with commercial antivirus softwares to detect Android malware including obfuscated variants.

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Paperback, New): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Paperback, New)
Jesse Varsalone, Matthew McFadden
R1,828 Discovery Miles 18 280 Ships in 10 - 15 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate understanding, giving you an insider's view of the secrets of hackers.

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition): Thomas J. Holt, Adam M Bossler, Kathryn C... Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition)
Thomas J. Holt, Adam M Bossler, Kathryn C Seigfried-Spellar
R1,305 Discovery Miles 13 050 Ships in 9 - 17 working days

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: * key theoretical and methodological perspectives; * computer hacking and malicious software; * digital piracy and intellectual theft; * economic crime and online fraud; * pornography and online sex crime; * cyber-bullying and cyber-stalking; * cyber-terrorism and extremism; * the rise of the Dark Web; * digital forensic investigation and its legal context around the world; * the law enforcement response to cybercrime transnationally; * cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

Black Hat - Misfits, Criminals, and Scammers in the Internet Age (Paperback, Softcover reprint of the original 1st ed.): Dup... Black Hat - Misfits, Criminals, and Scammers in the Internet Age (Paperback, Softcover reprint of the original 1st ed.)
Dup John Biggs
R461 Discovery Miles 4 610 Ships in 18 - 22 working days

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, -->John Biggs-->, this book is an ideal read for anyone who owns a computer and has ever pondered the threats of modern technology.

"Black Hat" takes a fair and thorough look at the hacking cases that have made the news in recent years. These stories include all the juicy details, like the people behind the hacking, as well as legislative attempts to curtail hacking, cracking, and spam. -->Table of Contents-->Black Hats: Things That Go Ping in the NightY.O.U. Mayhave Alredy 1!: SpamDeep Cover: SpywareShockwave: Worms and VirusesDear Friend: ScamsUpload or Perish: PiratesBreakin: HackingDon't Get Burned: White Hats

The Insider Threat - Assessment and Mitigation of Risks (Hardcover): Eleanor E. Thompson The Insider Threat - Assessment and Mitigation of Risks (Hardcover)
Eleanor E. Thompson
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

Cyberpunk - Outlaws and Hackers on the Computer Frontier (Paperback): Katie Hafner, John Markoff Cyberpunk - Outlaws and Hackers on the Computer Frontier (Paperback)
Katie Hafner, John Markoff
R561 Discovery Miles 5 610 Ships in 18 - 22 working days

Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find -- everything from bank accounts to military secrets. In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.

Cyber Frauds, Scams and their Victims (Paperback): Mark Button, Cassandra Cross Cyber Frauds, Scams and their Victims (Paperback)
Mark Button, Cassandra Cross
R1,464 Discovery Miles 14 640 Ships in 10 - 15 working days

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.

Crime and the Internet (Hardcover, annotated edition): David Wall Crime and the Internet (Hardcover, annotated edition)
David Wall
R4,493 Discovery Miles 44 930 Ships in 10 - 15 working days


Contents:
1. Introduction - Crime and the Internet David Wall 2. Crime Futures: the challenge of crime in the information age Ken Pease 3. Telecommunication Fraud in the Digital Age: the converging of technologies Peter Grabosky and Russell Smith 4. Between the Risk and the Reality Falls the Shadow: evidence and urban legends in computer fraud Michael Levi 5. Hacktivism: in search of lost ethics? 6. Last of the Rainmacs? Thinking about pornography in cyberspace Bela Bomita Chatterjee 67. Criminalising Online Speech to 'protect' the Young: what are the benefits and costs? Marjorie Heins 8. Controlling Illegal and Harmful Content on the Internet- Yaman Akendiz 9. Cyber-stalking: tackling harassment in the internet Louise Ellison 10. The Language of Cybercrime Matt Williams 11. Maintaining Order and Law on the Internet David Wall 12. Policing Hi-tech Crime in the Global Context: the role of trans-national policy networks Paul Norman 13. The Criminal Courts On-line Clive Walker Index

Security for Software Engineers (Hardcover): James N. Helfrich Security for Software Engineers (Hardcover)
James N. Helfrich
R2,851 Discovery Miles 28 510 Ships in 10 - 15 working days

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: Targets software engineering students - one of the only security texts to target this audience. Focuses on the white-hat side of the security equation rather than the black-hat side. Includes many practical and real-world examples that easily translate into the workplace. Covers a one-semester undergraduate course. Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user's information assets.

Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996,... Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (Paperback, 1996 ed.)
Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo
R1,543 Discovery Miles 15 430 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Fraud Investigation and Forensic Accounting in the Real World (Hardcover): William L. Jennings Fraud Investigation and Forensic Accounting in the Real World (Hardcover)
William L. Jennings
R4,157 Discovery Miles 41 570 Ships in 18 - 22 working days

This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forensic accounting assignment and fraud investigation. The book opens with an explanation of what happened to a company that was ensnared in a huge commodity purchasing scheme. Using his knowledge and experience gained over 40 years, the author illustrates that unexpected fraud occurrences can happen to any company, in any industry. Additionally, the author explains the current white-collar crime threats that organizations face every day, as well as legal issues that are often implicated in forensic accounting and fraud investigation projects. Electronic and non-electronic evidence gathering is also covered in detail with illustrative examples. One chapter is devoted entirely to the often misunderstood, but extremely important, subject of witness interviews. It provides the correct approach to the analysis and correlation of evidence in determining findings and conclusions of an investigation. Another chapter is devoted to proper report writing. The author provides detailed guidance on presenting findings to a variety of audiences, including management, a board, law enforcement, and at trials and hearings. It also covers proper techniques for measuring economic damages and concludes with a useful index. William L. Jennings is a Senior Director at Delta Consulting Group. He is responsible for providing forensic accounting, investigation, and asset recovery services to corporations, government agencies, attorneys, and their clients, as well as business controls consulting services to organizations. With more than 40 years of experience in public accounting and auditing, forensic accounting, business valuation, investigation, asset recovery, and business controls development, Mr. Jennings has worked on hundreds of forensic accounting and investigation assignments and he provides expert testimony.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CEH Certified Ethical Hacker Bundle…
Matt Walker Mixed media product R1,030 Discovery Miles 10 300
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda Paperback R1,208 Discovery Miles 12 080
Advanced Persistent Threat…
Eric Cole Paperback R1,111 Discovery Miles 11 110
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
Cyber Crime and Cyber Terrorism…
Babak Akhgar, Andrew Staniforth, … Paperback R1,110 Discovery Miles 11 100
Seven Deadliest Web Application Attacks
Mike Shema Paperback R577 Discovery Miles 5 770
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R474 Discovery Miles 4 740
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650
The Hacker's Guide to OS X - Exploiting…
Robert Bathurst, Russ Rogers, … Paperback R976 R760 Discovery Miles 7 600
This Is How They Tell Me the World Ends…
Nicole Perlroth Paperback R324 R297 Discovery Miles 2 970

 

Partners