0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R100 - R250 (4)
  • R250 - R500 (35)
  • R500+ (308)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Principles of Cybercrime (Hardcover, 2nd Revised edition): Jonathan Clough Principles of Cybercrime (Hardcover, 2nd Revised edition)
Jonathan Clough
R2,521 Discovery Miles 25 210 Ships in 12 - 17 working days

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.

US National Cybersecurity - International Politics, Concepts and Organization (Hardcover): Damien Van Puyvelde, Aaron Brantly US National Cybersecurity - International Politics, Concepts and Organization (Hardcover)
Damien Van Puyvelde, Aaron Brantly
R4,437 Discovery Miles 44 370 Ships in 12 - 17 working days

This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.

Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.): Sagar Ajay Rahalkar Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.)
Sagar Ajay Rahalkar
R1,744 Discovery Miles 17 440 Ships in 10 - 15 working days

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Cybercrime Through an Interdisciplinary Lens (Hardcover): Thomas Holt Cybercrime Through an Interdisciplinary Lens (Hardcover)
Thomas Holt
R4,164 Discovery Miles 41 640 Ships in 12 - 17 working days

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.

Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Hardcover): Peter W. Singer, Allan Friedman Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Hardcover)
Peter W. Singer, Allan Friedman
R1,652 R1,114 Discovery Miles 11 140 Save R538 (33%) Ships in 12 - 17 working days

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And, yet there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood. In Cybersecurity and CyberWar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and US militaries. Cybersecurity and CyberWar: What Everyone Needs to Know is the definitive account on the subject for us all, which comes not a moment too soon.

Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback): Eric Cole Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback)
Eric Cole
R1,085 Discovery Miles 10 850 Ships in 12 - 17 working days

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization" Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.

"Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.

Advanced Persistent Threat covers what you need to know including:

How and why organizations are being attacked

How to develop a "Risk based Approach to Security"

Tools for protecting data and preventing attacks

Critical information on how to respond and recover from an intrusion

The emerging threat to Cloud based networks "

The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback): Robert Bathurst, Russ Rogers, Alijohn... The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback)
Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
R1,018 R736 Discovery Miles 7 360 Save R282 (28%) Ships in 12 - 17 working days

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.

*Provides relevant information including some of the latest OS X threats

*Easily accessible to those without any prior OS X experience

*Useful tips and strategies for exploiting and compromising OS X systems

*Includes discussion of defensive and countermeasure applications and how to use them

*Covers mobile IOS vulnerabilities

Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Hardcover): Erica Stanford Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Hardcover)
Erica Stanford
R1,417 R1,125 Discovery Miles 11 250 Save R292 (21%) Ships in 10 - 15 working days

HIGHLY COMMENDED: Business Book Awards 2022 - Specialist Business Book Crypto is big news. You may be an existing user yourself or have friends that laud its promise of getting rich fast. Arm yourself with the knowledge to come out on top in the crypto wars. If thousands of people can lose billions of dollars in OneCoin, masterminded by the now infamous Missing Cryptoqueen made famous by the BBC's podcast series and called 'one of the biggest scams in history' by The Times, what makes you think your money is safe? OneCoin isn't alone. Crypto Wars reveals how some of the most shocking scams affected millions of innocent people all around the world with everything from religious leaders to celebrities involved. In this book, you get exclusive access to the back story of the most extreme Ponzi schemes, the most bizarre hoaxes and brutal exit strategies from some of the biggest charlatans of crypto. Crypto expert and educator, Erica Stanford, will show you how market-wide manipulation schemes, unregulated processes and a new collection of technologies that are often misunderstood, have been exploited to create the wild west of crypto, run by some less than reputable characters. From OneCoin to PonziCoin to Trumpcoin and everything in between, Crypto Wars uncovers the scandals, unpicks the system behind them and allows you to better understand a new technology that has the potential to revolutionize banking and our world for the better.

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Paperback, New): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Paperback, New)
Jesse Varsalone, Matthew McFadden
R1,658 Discovery Miles 16 580 Ships in 12 - 17 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate understanding, giving you an insider's view of the secrets of hackers.

Seven Deadliest Web Application Attacks (Paperback): Mike Shema Seven Deadliest Web Application Attacks (Paperback)
Mike Shema
R545 Discovery Miles 5 450 Ships in 12 - 17 working days

Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered. This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers.

The Insider Threat - Assessment and Mitigation of Risks (Hardcover): Eleanor E. Thompson The Insider Threat - Assessment and Mitigation of Risks (Hardcover)
Eleanor E. Thompson
R1,925 Discovery Miles 19 250 Ships in 12 - 17 working days

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

Hacking Web Intelligence - Open Source Intelligence and Web Reconnaissance Concepts and Techniques (Paperback): Sudhanshu... Hacking Web Intelligence - Open Source Intelligence and Web Reconnaissance Concepts and Techniques (Paperback)
Sudhanshu Chauhan, Nutan Kumar Panda
R1,182 Discovery Miles 11 820 In Stock

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.

No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback): Johnny Long No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback)
Johnny Long; Series edited by Kevin D. Mitnick
R1,036 R810 Discovery Miles 8 100 Save R226 (22%) Ships in 12 - 17 working days

As the cliche reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.
As you browse this book, you'll hear old familiar terms like "dumpster diving," "social engineering," and "shoulder surfing." Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big boldletters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Black Hat - Misfits, Criminals, and Scammers in the Internet Age (Paperback, Softcover reprint of the original 1st ed.): Dup... Black Hat - Misfits, Criminals, and Scammers in the Internet Age (Paperback, Softcover reprint of the original 1st ed.)
Dup John Biggs
R527 R450 Discovery Miles 4 500 Save R77 (15%) Ships in 10 - 15 working days

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, -->John Biggs-->, this book is an ideal read for anyone who owns a computer and has ever pondered the threats of modern technology.

"Black Hat" takes a fair and thorough look at the hacking cases that have made the news in recent years. These stories include all the juicy details, like the people behind the hacking, as well as legislative attempts to curtail hacking, cracking, and spam. -->Table of Contents-->Black Hats: Things That Go Ping in the NightY.O.U. Mayhave Alredy 1!: SpamDeep Cover: SpywareShockwave: Worms and VirusesDear Friend: ScamsUpload or Perish: PiratesBreakin: HackingDon't Get Burned: White Hats

Cyber Frauds, Scams and their Victims (Paperback): Mark Button, Cassandra Cross Cyber Frauds, Scams and their Victims (Paperback)
Mark Button, Cassandra Cross
R1,267 Discovery Miles 12 670 Ships in 12 - 17 working days

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.

Computer Crimes and Digital Investigations (Hardcover, 2nd Revised edition): Ian Walden Computer Crimes and Digital Investigations (Hardcover, 2nd Revised edition)
Ian Walden 1
R5,010 Discovery Miles 50 100 Ships in 12 - 17 working days

Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.

Security for Software Engineers (Hardcover): James N. Helfrich Security for Software Engineers (Hardcover)
James N. Helfrich
R2,535 Discovery Miles 25 350 Ships in 12 - 17 working days

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: Targets software engineering students - one of the only security texts to target this audience. Focuses on the white-hat side of the security equation rather than the black-hat side. Includes many practical and real-world examples that easily translate into the workplace. Covers a one-semester undergraduate course. Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user's information assets.

Cyber War versus Cyber Realities - Cyber Conflict in the International System (Hardcover): Brandon Valeriano, Ryan C Maness Cyber War versus Cyber Realities - Cyber Conflict in the International System (Hardcover)
Brandon Valeriano, Ryan C Maness
R1,054 Discovery Miles 10 540 Ships in 12 - 17 working days

In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism.

Crime and the Internet (Hardcover, annotated edition): David Wall Crime and the Internet (Hardcover, annotated edition)
David Wall
R3,882 Discovery Miles 38 820 Ships in 12 - 17 working days


Contents:
1. Introduction - Crime and the Internet David Wall 2. Crime Futures: the challenge of crime in the information age Ken Pease 3. Telecommunication Fraud in the Digital Age: the converging of technologies Peter Grabosky and Russell Smith 4. Between the Risk and the Reality Falls the Shadow: evidence and urban legends in computer fraud Michael Levi 5. Hacktivism: in search of lost ethics? 6. Last of the Rainmacs? Thinking about pornography in cyberspace Bela Bomita Chatterjee 67. Criminalising Online Speech to 'protect' the Young: what are the benefits and costs? Marjorie Heins 8. Controlling Illegal and Harmful Content on the Internet- Yaman Akendiz 9. Cyber-stalking: tackling harassment in the internet Louise Ellison 10. The Language of Cybercrime Matt Williams 11. Maintaining Order and Law on the Internet David Wall 12. Policing Hi-tech Crime in the Global Context: the role of trans-national policy networks Paul Norman 13. The Criminal Courts On-line Clive Walker Index

Crime and the Internet (Paperback): David Wall Crime and the Internet (Paperback)
David Wall
R1,825 Discovery Miles 18 250 Ships in 12 - 17 working days


Is the internet really powerful enough to enable a sixteen year old to become the biggest threat to world peace since Adolf Hitler? Are we all now susceptible to cyber-criminals who can steal from us without even having to leave the comfort of their own armchairs? These are fears which have been articulated since the popular development of the internet, yet criminologists have been slow to respond to them. Consequently, questions about what cybercrimes are, what their impacts will be and how we respond to them remain largely unanswered.
Organised into three sections, this book engages with the various criminological debates that are emerging over cybercrime. The first section looks at the general problem of crime and the internet. It then describes what is understood by the term 'cybercrime' by identifying some of the challenges that they present for criminology. The second section explores the different types of cybercrime and their attendant problems. The final section contemplates some of the challenges that cybercrimes give rise to for the criminal justice system.

CEH Certified Ethical Hacker Practice Exams, Fifth Edition (Paperback, 5th edition): Matt Walker CEH Certified Ethical Hacker Practice Exams, Fifth Edition (Paperback, 5th edition)
Matt Walker
R663 Discovery Miles 6 630 Ships in 12 - 17 working days

Hundreds of accurate practice questions-fully updated for the current version of the CEH exam Thoroughly revised for CEH v11 exam objectives, this self-study guide contains more than 350 practice questions to prepare candidates for the EC-Council's Certified Ethical Hacker exam. All questions match the actual exam in content, format, and feel. To aid in understanding the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment test evaluates readiness and identifies areas requiring further study. CEH Certified Ethical Hacker Practice Exams, Fifth Edition offers practice test items from each domain of the latest edition of the exam-including knowledge, performance, and scenario-based questions. The book features up-to-date coverage of all phases of ethical hacking, including reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Designed to help readers pass the exam with ease, this is the perfect companion to the All-in-One Exam Guide. Contains more than 350 realistic questions with detailed answer explanations Online content includes access to the TotalTester customizable practice exam engine with an additional 300 practice questions Written by an experienced trainer with more than 30 years of cybersecurity experience

Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback): RA Grimes Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback)
RA Grimes
R569 R472 Discovery Miles 4 720 Save R97 (17%) Ships in 12 - 17 working days

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. * Go deep into the world of white hat hacking to grasp just how critical cybersecurity is * Read the stories of some of the world's most renowned computer security experts * Learn how hackers do what they do no technical expertise necessary * Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996,... Computer Security - ESORICS 96 - 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (Paperback, 1996 ed.)
Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo
R1,616 Discovery Miles 16 160 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Cybercrime and its victims (Paperback): Elena Martellozzo, Emma Jane Cybercrime and its victims (Paperback)
Elena Martellozzo, Emma Jane
R1,329 Discovery Miles 13 290 Ships in 12 - 17 working days

The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies. The book is organised thematically into five parts. Part one addresses some broad conceptual and theoretical issues. Part two is concerned with issues relating to sexual violence, abuse, and exploitation, as well as to sexual expression online. Part three addresses issues related to race and culture. Part four addresses concerns around cyberbullying and online suicide, grouped together as 'social violence'. The final part argues that victims of cybercrime are, in general, neglected and not receiving the recognition and support they need and deserve. It concludes that in the volatile and complex world of cyberspace continued awareness-raising is essential for bringing attention to the plight of victims. It also argues that there needs to be more support of all kinds for victims, as well as an increase in the exposure and punishment of perpetrators. Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.

Deep Fakes and the Infocalypse - What You Urgently Need To Know (Paperback): Nina Schick Deep Fakes and the Infocalypse - What You Urgently Need To Know (Paperback)
Nina Schick 1
R381 R309 Discovery Miles 3 090 Save R72 (19%) Ships in 9 - 15 working days

It will soon be impossible to tell what is real and what is fake.

Recent advances in AI mean that by scanning images of a person (for example using Facebook), a powerful machine learning system can create new video images and place them in scenarios and situations which never actually happened. When combined with powerful voice AI, the results are utterly convincing.

So-called 'Deep Fakes' are not only a real threat for democracy but they take the manipulation of voters to new levels. They will also affect ordinary people. This crisis of misinformation we are facing has been dubbed the 'Infocalypse'.

Using her expertise from working in the field, Nina Schick reveals shocking examples of Deep Fakery and explains the dangerous political consequences of the Infocalypse, both in terms of national security and what it means for public trust in politics. She also unveils what it means for us as individuals, how Deep Fakes will be used to intimidate and to silence, for revenge and fraud, and how unprepared governments and tech companies are.

As a political advisor to select technology firms, Schick tells us what we need to do to prepare and protect ourselves. Too often we build the cool technology and ignore what bad guys can do with it before we start playing catch-up. But when it comes to Deep Fakes, we urgently need to be on the front foot.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Science in Cybersecurity and…
Leslie F Sikos, Kim-Kwang Raymond Choo Hardcover R4,897 Discovery Miles 48 970
Game Over Girl
Naomi Gibson Paperback R202 Discovery Miles 2 020
Hacking
Walter Spivak Hardcover R901 Discovery Miles 9 010
The Pentester BluePrint - Starting a…
PL Wylie Paperback R574 Discovery Miles 5 740
Digital Forensic Investigation of…
Reza Montasari, Hamid Jahankhani, … Hardcover R3,949 Discovery Miles 39 490
Computer and Intrusion Forensics
George Mohay, Alison Anderson, … Hardcover R2,717 Discovery Miles 27 170
Malware Analysis Using Artificial…
Mark Stamp, Mamoun Alazab, … Hardcover R4,951 Discovery Miles 49 510
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R479 Discovery Miles 4 790
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,288 Discovery Miles 22 880
Hackers and Hacking - A Reference…
Thomas J. Holt, Bernadette H Schell Hardcover R2,236 R1,915 Discovery Miles 19 150

 

Partners