0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (28)
  • R500+ (299)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Digital Music Distribution - The Sociology of Online Music Streams (Hardcover): Hendrik Storstein Spilker Digital Music Distribution - The Sociology of Online Music Streams (Hardcover)
Hendrik Storstein Spilker
R4,488 Discovery Miles 44 880 Ships in 10 - 15 working days

The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. Digital Music Distribution aims to go beyond the polarized and reductive perception of 'piracy wars' to offer a broader and richer understanding of the paradoxes inherent in new forms of distribution. Covering both production and consumption perspectives, Spilker analyses the changes and regulatory issues through original case studies, looking at how digital music distribution has both changed and been changed by the cultural practices and politicking of ordinary youth, their parents, music counter cultures, artists and bands, record companies, technology developers, mass media and regulatory authorities. Exploring the fundamental change in distribution, Spilker investigates paradoxes such as: The criminalization of file-sharing leading not to conflicts, but to increased collaboration between youths and their parents; Why the circulation of cultural content, extremely damaging for its producers, has instead been advantageous for the manufacturers of recording equipment; Why more artists are recording in professional sound studios, despite the proliferation of good quality equipment for home recording; Why mass media, hit by many of the same challenges as the music industry, has been so critical of the way it has tackled these challenges. A rare and timely volume looking at the changes induced by the digitalization of music distribution, Digital Music Distribution will appeal to undergraduate students and policy makers interested in fields such as Media Studies, Digital Media, Music Business, Sociology and Cultural Studies.

Cybercrime and its victims (Paperback): Elena Martellozzo, Emma Jane Cybercrime and its victims (Paperback)
Elena Martellozzo, Emma Jane
R1,498 Discovery Miles 14 980 Ships in 10 - 15 working days

The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies. The book is organised thematically into five parts. Part one addresses some broad conceptual and theoretical issues. Part two is concerned with issues relating to sexual violence, abuse, and exploitation, as well as to sexual expression online. Part three addresses issues related to race and culture. Part four addresses concerns around cyberbullying and online suicide, grouped together as 'social violence'. The final part argues that victims of cybercrime are, in general, neglected and not receiving the recognition and support they need and deserve. It concludes that in the volatile and complex world of cyberspace continued awareness-raising is essential for bringing attention to the plight of victims. It also argues that there needs to be more support of all kinds for victims, as well as an increase in the exposure and punishment of perpetrators. Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.

Cyber War Will Not Take Place (Paperback): Thomas Rid Cyber War Will Not Take Place (Paperback)
Thomas Rid
R360 R332 Discovery Miles 3 320 Save R28 (8%) Ships in 5 - 10 working days

'Cyber war is coming,' announced a landmark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the 'fifth domain' of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain?Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure?How serious is the threat of 'pure' cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

Cybercrime in Progress - Theory and prevention of technology-enabled offenses (Paperback): Thomas Holt, Adam Bossler Cybercrime in Progress - Theory and prevention of technology-enabled offenses (Paperback)
Thomas Holt, Adam Bossler
R1,741 Discovery Miles 17 410 Ships in 10 - 15 working days

The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these issues has increased dramatically over the last decade, as have studies on ways to prevent and police these offenses. This book is one of the first texts to provide a comprehensive review of research regarding cybercrime, policing and enforcing these offenses, and the prevention of various offenses as global change and technology adoption increases the risk of victimization around the world. Drawing on a wide range of literature, Holt and Bossler offer an extensive synthesis of numerous contemporary topics such as theories used to account for cybercrime, policing in domestic and transnational contexts, cybercrime victimization and issues in cybercrime prevention. The findings provide a roadmap for future research in cybercrime, policing, and technology, and discuss key controversies in the existing research literature in a way that is otherwise absent from textbooks and general cybercrime readers. This book is an invaluable resource for academics, practitioners, and students interested in understanding the state of the art in social science research. It will be of particular interest to scholars and students interested in cybercrime, cyber-deviance, victimization, policing, criminological theory, and technology in general.

Policing Cybercrime - Networked and Social Media Technologies and the Challenges for Policing (Hardcover): David S. Wall,... Policing Cybercrime - Networked and Social Media Technologies and the Challenges for Policing (Hardcover)
David S. Wall, Matthew Williams
R4,489 Discovery Miles 44 890 Ships in 10 - 15 working days

Cybercrime has recently experienced an ascending position in national security agendas world-wide. It has become part of the National Security Strategies of a growing number of countries, becoming a Tier One threat, above organised crime and fraud generally. Furthermore, new techno-social developments in social network media suggest that cyber-threats will continue to increase. This collection addresses the recent 'inertia' in both critical thinking and the empirical study of cybercrime and policing by adding to the literature seven interdisciplinary and critical chapters on various issues relating to the new generation of cybercrimes currently being experienced. The chapters illustrate that cybercrimes are changing in two significant ways that are asymmetrical. On the one hand cybercrime is becoming increasingly professionalised, resulting in 'specialists' that perform complex and sophisticated attacks on computer systems and human users. On the other, the 'hyper-connectivity' brought about by the exponential growth in social media users has opened up opportunities to 'non-specialist' citizens to organise and communicate in ways that facilitate crimes on and offline. While largely distinct, these developments pose equally contrasting challenges for policing which this book addresses. This book was originally published as a special issue of Policing and Society.

Secure, Resilient, and Agile Software Development (Hardcover): Mark Merkow Secure, Resilient, and Agile Software Development (Hardcover)
Mark Merkow
R2,261 Discovery Miles 22 610 Ships in 10 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

Forensic Discovery (Paperback): Daniel Farmer, Wietse Venema Forensic Discovery (Paperback)
Daniel Farmer, Wietse Venema
R1,156 Discovery Miles 11 560 Ships in 10 - 15 working days

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of "Exploiting Software" and "Building Secure Software"

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
--Steve Bellovin, coauthor of "Firewalls and Internet Security, Second Edition," and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
--Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
--Rik Farrow, Consultant, author of "Internet Security for Home and Office"

"Farmer and Venema do for digital archaeology what Indiana Jones did for historicalarchaeology. "Forensic Discovery" unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
--Richard Bejtlich, technical director, ManTech CFIA, and author of "The Tao of Network Security Monitoring"

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
--Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
--Brian Carrier, digital forensics researcher, and author of "File System Forensic Analysis"The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a widevariety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to Understand essential forensics concepts: volatility, layering, and trustGather the maximum amount of reliable evidence from a running systemRecover partially destroyed information--and make sense of itTimeline your system: understand what really happened whenUncover secret changes to everything from system utilities to kernel modulesAvoid cover-ups and evidence traps set by intrudersIdentify the digital footprints associated with suspicious activityUnderstand file systems from a forensic analyst's point of viewAnalyze malware--without giving it a chance to escapeCapture and examine the contents of main memory on running systems Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Google Hacking for Penetration Testers (Paperback, 3rd edition): Johnny Long, Bill Gardner, Justin Brown Google Hacking for Penetration Testers (Paperback, 3rd edition)
Johnny Long, Bill Gardner, Justin Brown
R1,273 Discovery Miles 12 730 Ships in 10 - 15 working days

Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition): Thomas J. Holt, Adam M Bossler, Kathryn C... Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition)
Thomas J. Holt, Adam M Bossler, Kathryn C Seigfried-Spellar
R1,328 Discovery Miles 13 280 Ships in 10 - 15 working days

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: * key theoretical and methodological perspectives; * computer hacking and malicious software; * digital piracy and intellectual theft; * economic crime and online fraud; * pornography and online sex crime; * cyber-bullying and cyber-stalking; * cyber-terrorism and extremism; * the rise of the Dark Web; * digital forensic investigation and its legal context around the world; * the law enforcement response to cybercrime transnationally; * cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

Fraud Investigation and Forensic Accounting in the Real World (Hardcover): William L. Jennings Fraud Investigation and Forensic Accounting in the Real World (Hardcover)
William L. Jennings
R4,157 Discovery Miles 41 570 Ships in 18 - 22 working days

This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forensic accounting assignment and fraud investigation. The book opens with an explanation of what happened to a company that was ensnared in a huge commodity purchasing scheme. Using his knowledge and experience gained over 40 years, the author illustrates that unexpected fraud occurrences can happen to any company, in any industry. Additionally, the author explains the current white-collar crime threats that organizations face every day, as well as legal issues that are often implicated in forensic accounting and fraud investigation projects. Electronic and non-electronic evidence gathering is also covered in detail with illustrative examples. One chapter is devoted entirely to the often misunderstood, but extremely important, subject of witness interviews. It provides the correct approach to the analysis and correlation of evidence in determining findings and conclusions of an investigation. Another chapter is devoted to proper report writing. The author provides detailed guidance on presenting findings to a variety of audiences, including management, a board, law enforcement, and at trials and hearings. It also covers proper techniques for measuring economic damages and concludes with a useful index. William L. Jennings is a Senior Director at Delta Consulting Group. He is responsible for providing forensic accounting, investigation, and asset recovery services to corporations, government agencies, attorneys, and their clients, as well as business controls consulting services to organizations. With more than 40 years of experience in public accounting and auditing, forensic accounting, business valuation, investigation, asset recovery, and business controls development, Mr. Jennings has worked on hundreds of forensic accounting and investigation assignments and he provides expert testimony.

Cypherpunk Ethics - Radical Ethics for the Digital Age (Hardcover): Patrick D. Anderson Cypherpunk Ethics - Radical Ethics for the Digital Age (Hardcover)
Patrick D. Anderson
R1,654 Discovery Miles 16 540 Ships in 10 - 15 working days

Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age. Focusing on the writings of Timothy May and Julian Assange, two of the most prolific and influential cypherpunks, the book examines two competing paradigms of cypherpunk philosophy-crypto anarchy and crypto justice-and examines the implications of cypherpunk ethics for a range of contemporary moral issues, including surveillance, privacy, whistleblowing, cryptocurrencies, journalism, democracy, censorship, intellectual property, and power. Rooted in theory but with very real applications, this volume will appeal not only to students and scholars of digital media, communication, journalism, philosophy, political science, critical data studies, sociology, and the history of technology but also to technologists and activists around the world.

Forensic Computer Crime Investigation (Hardcover, New): Thomas A. Johnson Forensic Computer Crime Investigation (Hardcover, New)
Thomas A. Johnson
R4,935 Discovery Miles 49 350 Ships in 10 - 15 working days

The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions...and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest strategies law enforcement officials can leverage against the perpetrators of cyber crimes. From describing the fundamentals of computer crimes and the scenes left in their wake to detailing how to build an effective forensic investigative force, this book is an essential guide on how to beat cyber criminals at their own game. It takes you into the minds of computer criminals, noting universal characteristics and behaviors; it discusses strategies and techniques common to successful investigations; and it reveals how to overcome challenges that may arise when securing digital forensic evidence. For those intent on making sure that no one is a potential victim, there is a chapter devoted to investigating Internet crimes against children. Additional chapters include information on strategies unique to international forensics and on that emerging wave of computer crime known as cyber terrorism. To make sure that all the angles are covered and that your investigation is carried out efficiently, effectively, and successfully, Forensic Computer Crime Investigation is an invaluable resource to have with you at all times!

The Human Factor of Cybercrime (Hardcover): Rutger Leukfeldt, Thomas J. Holt The Human Factor of Cybercrime (Hardcover)
Rutger Leukfeldt, Thomas J. Holt
R4,527 Discovery Miles 45 270 Ships in 10 - 15 working days

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover): Richard Warner, Robert Sloan Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Hardcover)
Richard Warner, Robert Sloan
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Cybercrime Through an Interdisciplinary Lens (Paperback): Thomas Holt Cybercrime Through an Interdisciplinary Lens (Paperback)
Thomas Holt
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.

Gender, Technology and Violence (Paperback): Marie Segrave, Laura Vitis Gender, Technology and Violence (Paperback)
Marie Segrave, Laura Vitis
R1,427 Discovery Miles 14 270 Ships in 10 - 15 working days

Technological developments move at lightening pace and can bring with them new possibilities for social harm. This book brings together original empirical and theoretical work examining how digital technologies both create and sustain various forms of gendered violence and provide platforms for resistance and criminal justice intervention. This edited collection is organised around two key themes of facilitation and resistance, with an emphasis through the whole collection on the development of a gendered interrogation of contemporary practices of technologically-enabled or enhanced practices of violence. Addressing a broad range of criminological issues such as intimate partner violence, rape and sexual assault, online sexual harassment, gendered political violence, online culture, cyberbullying, and human trafficking, and including a critical examination of the broader issue of feminist 'digilantism' and resistance to online sexual harassment, this book examines the ways in which new and emerging technologies facilitate new platforms for gendered violence as well as offering both formal and informal opportunities to prevent and/or respond to gendered violence.

Digital Criminology - Crime and Justice in Digital Society (Hardcover): Anastasia Powell, Gregory Stratton, Robin Cameron Digital Criminology - Crime and Justice in Digital Society (Hardcover)
Anastasia Powell, Gregory Stratton, Robin Cameron
R5,343 Discovery Miles 53 430 Ships in 10 - 15 working days

The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday crimes. Digital Criminology: Crime and Justice in Digital Society is the first interdisciplinary scholarly investigation extending beyond traditional topics of cybercrime, policing and the law to consider the implications of digital society for public engagement with crime and justice movements. This book seeks to connect the disparate fields of criminology, sociology, legal studies, politics, media and cultural studies in the study of crime and justice. Drawing together intersecting conceptual frameworks, Digital Criminology examines conceptual, legal, political and cultural framings of crime, formal justice responses and informal citizen-led justice movements in our increasingly connected global and digital society. Building on case study examples from across Australia, Canada, Europe, China, the UK and the United States, Digital Criminology explores key questions including: What are the implications of an increasingly digital society for crime and justice? What effects will emergent technologies have for how we respond to crime and participate in crime debates? What will be the foundational shifts in criminological research and frameworks for understanding crime and justice in this technologically mediated context? What does it mean to be a 'just' digital citizen? How will digital communications and social networks enable new forms of justice and justice movements? Ultimately, the book advances the case for an emerging digital criminology: extending the practical and conceptual analyses of 'cyber' or 'e' crime beyond a focus foremost on the novelty, pathology and illegality of technology-enabled crimes, to understandings of online crime as inherently social. Twitter: @DigiCrimRMIT

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,668 R1,275 Discovery Miles 12 750 Save R393 (24%) Ships in 10 - 15 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Cybercrime Through an Interdisciplinary Lens (Hardcover): Thomas Holt Cybercrime Through an Interdisciplinary Lens (Hardcover)
Thomas Holt
R4,636 Discovery Miles 46 360 Ships in 10 - 15 working days

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.

Internet Fraud Casebook - The World Wide Web of Deceit (Hardcover): JT Wells Internet Fraud Casebook - The World Wide Web of Deceit (Hardcover)
JT Wells
R1,875 Discovery Miles 18 750 Ships in 10 - 15 working days

Real case studies on Internet fraud written by real fraud examiners

"Internet Fraud Casebook: The World Wide Web of Deceit" is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world.Each case outlines how the fraud was engineered, how it was investigated, and how perpetrators were brought to justiceTopics included are phishing, on-line auction fraud, security breaches, counterfeiting, and othersOther titles by Wells: "Fraud Casebook, Principles of Fraud Examination, " and "Computer Fraud Casebook"

This book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place.

The Basics of Hacking and Penetration Testing - Ethical Hacking and Penetration Testing Made Easy (Paperback, 2nd edition):... The Basics of Hacking and Penetration Testing - Ethical Hacking and Penetration Testing Made Easy (Paperback, 2nd edition)
Patrick Engebretson
R687 R555 Discovery Miles 5 550 Save R132 (19%) Ships in 10 - 15 working days

"The Basics of Hacking and Penetration Testing "serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes theKali Linux distribution and focuses on the seminal tools required to complete a penetration test."

The Unrevealed Secrets of Hacking & Cracking - Hack Before You Get Cracked (Paperback): Prateek Shukla, Navneet Mehra The Unrevealed Secrets of Hacking & Cracking - Hack Before You Get Cracked (Paperback)
Prateek Shukla, Navneet Mehra
R233 Discovery Miles 2 330 Ships in 10 - 15 working days
Cyber Mercenaries - The State, Hackers, and Power (Paperback): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Paperback)
Tim Maurer
R822 Discovery Miles 8 220 Ships in 10 - 15 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Computer Forensics JumpStart 2e (Paperback, 2nd Edition): Mg Solomon Computer Forensics JumpStart 2e (Paperback, 2nd Edition)
Mg Solomon
R659 R553 Discovery Miles 5 530 Save R106 (16%) Ships in 10 - 15 working days

Essential reading for launching a career in computer forensics

Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crimeDetails the ways to conduct a computer forensics investigationHighlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witnessWalks you through identifying, collecting, and preserving computer evidenceExplains how to understand encryption and examine encryption files

"Computer Forensics JumpStart" is the resource you need to launch a career in computer forensics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PVD for Microelectronics: Sputter…
Stephen M. Rossnagel, Ronald Powell, … Hardcover R3,338 Discovery Miles 33 380
Empire Of AI - Inside The Reckless Race…
Karen Hao Paperback R359 R285 Discovery Miles 2 850
How The Secret Changed My Life - Real…
Rhonda Byrne Hardcover  (4)
R438 R401 Discovery Miles 4 010
Special and General Relativity - An…
Rainer Dick Paperback R754 Discovery Miles 7 540
Cook, Eat, Repeat - Ingredients, Recipes…
Nigella Lawson Hardcover R651 Discovery Miles 6 510
Advances in Global Optimization
David Gao, Ning Ruan, … Hardcover R2,764 Discovery Miles 27 640
Polyelectrolyte Complexes in the…
Martin Mu>ller Hardcover R5,940 Discovery Miles 59 400
The Art of Hearthstone: Year of the…
Robert Brooks Hardcover R651 Discovery Miles 6 510
Chemical Thermodynamics: Principles and…
J. Bevan Ott, Juliana Boerio-Goates Hardcover R2,979 Discovery Miles 29 790
When Did Everybody Else Get So Old…
Jennifer Grant Hardcover R670 R599 Discovery Miles 5 990

 

Partners