0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (32)
  • R500+ (313)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback): RA Grimes Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback)
RA Grimes
R580 R538 Discovery Miles 5 380 Save R42 (7%) Ships in 12 - 19 working days

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. * Go deep into the world of white hat hacking to grasp just how critical cybersecurity is * Read the stories of some of the world's most renowned computer security experts * Learn how hackers do what they do no technical expertise necessary * Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Cybersecurity for Beginners (Paperback, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Paperback, 2nd Revised edition)
Raef Meeuwisse
R556 Discovery Miles 5 560 Ships in 9 - 17 working days
Democracy Hacked - Political Turmoil and Information Warfare in the Digital Age (Hardcover): Martin Moore Democracy Hacked - Political Turmoil and Information Warfare in the Digital Age (Hardcover)
Martin Moore 1
R673 R610 Discovery Miles 6 100 Save R63 (9%) Ships in 10 - 15 working days

In the space of one election cycle, authoritarian governments, moneyed elites and fringe hackers figured out how to game elections, bypass democratic processes, and turn social networks into battlefields. Facebook, Google and Twitter - where our politics now takes place - have lost control and are struggling to claw it back. Prepare for a new strain of democracy. A world of datafied citizens, real-time surveillance, enforced wellness and pre-crime. Where switching your mobile platform will have more impact on your life than switching your government. Where freedom and privacy are seen as incompatible with social wellbeing and compulsory transparency. As our lives migrate online, we have become increasingly vulnerable to digital platforms founded on selling your attention to the highest bidder. Our laws don't cover what is happening and our politicians don't understand it. But if we don't change the system now, we may not get another chance.

The Human Factor of Cybercrime (Hardcover): Rutger Leukfeldt, Thomas J. Holt The Human Factor of Cybercrime (Hardcover)
Rutger Leukfeldt, Thomas J. Holt
R4,511 Discovery Miles 45 110 Ships in 12 - 19 working days

Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,769 Discovery Miles 17 690 Ships in 12 - 19 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Digital Criminology - Crime and Justice in Digital Society (Hardcover): Anastasia Powell, Gregory Stratton, Robin Cameron Digital Criminology - Crime and Justice in Digital Society (Hardcover)
Anastasia Powell, Gregory Stratton, Robin Cameron
R5,379 Discovery Miles 53 790 Ships in 12 - 19 working days

The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday crimes. Digital Criminology: Crime and Justice in Digital Society is the first interdisciplinary scholarly investigation extending beyond traditional topics of cybercrime, policing and the law to consider the implications of digital society for public engagement with crime and justice movements. This book seeks to connect the disparate fields of criminology, sociology, legal studies, politics, media and cultural studies in the study of crime and justice. Drawing together intersecting conceptual frameworks, Digital Criminology examines conceptual, legal, political and cultural framings of crime, formal justice responses and informal citizen-led justice movements in our increasingly connected global and digital society. Building on case study examples from across Australia, Canada, Europe, China, the UK and the United States, Digital Criminology explores key questions including: What are the implications of an increasingly digital society for crime and justice? What effects will emergent technologies have for how we respond to crime and participate in crime debates? What will be the foundational shifts in criminological research and frameworks for understanding crime and justice in this technologically mediated context? What does it mean to be a 'just' digital citizen? How will digital communications and social networks enable new forms of justice and justice movements? Ultimately, the book advances the case for an emerging digital criminology: extending the practical and conceptual analyses of 'cyber' or 'e' crime beyond a focus foremost on the novelty, pathology and illegality of technology-enabled crimes, to understandings of online crime as inherently social. Twitter: @DigiCrimRMIT

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,340 Discovery Miles 13 400 Ships in 12 - 19 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Hardcover): Peter W. Singer, Allan Friedman Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Hardcover)
Peter W. Singer, Allan Friedman
R1,686 R1,207 Discovery Miles 12 070 Save R479 (28%) Ships in 12 - 19 working days

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And, yet there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood. In Cybersecurity and CyberWar: What Everyone Needs to Know, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and US militaries. Cybersecurity and CyberWar: What Everyone Needs to Know is the definitive account on the subject for us all, which comes not a moment too soon.

The Unrevealed Secrets of Hacking & Cracking - Hack Before You Get Cracked (Paperback): Prateek Shukla, Navneet Mehra The Unrevealed Secrets of Hacking & Cracking - Hack Before You Get Cracked (Paperback)
Prateek Shukla, Navneet Mehra
R248 Discovery Miles 2 480 Ships in 12 - 19 working days
Handbook of Big Data Analytics and Forensics (Paperback, 1st ed. 2022): Kim-Kwang Raymond Choo, Ali Dehghantanha Handbook of Big Data Analytics and Forensics (Paperback, 1st ed. 2022)
Kim-Kwang Raymond Choo, Ali Dehghantanha
R5,086 Discovery Miles 50 860 Ships in 10 - 15 working days

This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.

Cyber Wars - Hacks that Shocked the Business World (Paperback): Charles Arthur Cyber Wars - Hacks that Shocked the Business World (Paperback)
Charles Arthur 1
R535 Discovery Miles 5 350 Ships in 12 - 19 working days

Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game changing hacks that make organizations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders and this book provides a deep insight into understanding how they work, how hackers think as well as giving invaluable advice on staying vigilant and avoiding the security mistakes and oversights that can lead to downfall. No organization is safe but by understanding the context within which we now live and what the hacks of the future might look like, you can minimize the threat.

In Cyber Wars, you will learn how hackers in a TK Maxx parking lot managed to steal 94m credit card details costing the organization $1bn; how a 17 year old leaked the data of 157,000 TalkTalk customers causing a reputational disaster; how Mirai can infect companies' Internet of Things devices and let hackers control them; how a sophisticated malware attack on Sony caused corporate embarrassment and company-wide shut down; and how a phishing attack on Clinton Campaign Chairman John Podesta's email affected the outcome of the 2016 US election.

Breaking and Entering - The Extraordinary Story of a Hacker Called `Alien' (Paperback): Jeremy N. Smith Breaking and Entering - The Extraordinary Story of a Hacker Called `Alien' (Paperback)
Jeremy N. Smith 1
R463 R439 Discovery Miles 4 390 Save R24 (5%) Ships in 12 - 19 working days

Hackers know everything about us. We know almost nothing about them. Until now.

The hacker now known as Alien entered MIT in 1998, intending to major in aerospace engineering. Almost immediately, she was recruited to join a secret student group scaling walls, breaking into buildings, pulling elaborate pranks, and exploring computer systems. Within a year, one of her hall mates was dead and two others were arraigned. And Alien’s adventures were only beginning.

Breaking and Entering is a whirlwind history of the last 20 years of hacking and cybersecurity. As Alien develops from teenage novice to international expert, she joins the secret vanguard of our digitised world, and reveals the forces at work behind our everyday technology.

Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Paperback, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

White-Collar Crime Online - Deviance, Organizational Behaviour and Risk (Paperback, 1st ed. 2022): Petter Gottschalk,... White-Collar Crime Online - Deviance, Organizational Behaviour and Risk (Paperback, 1st ed. 2022)
Petter Gottschalk, Christopher Hamerton
R3,363 Discovery Miles 33 630 Ships in 10 - 15 working days

This initiating monograph provides the first thorough examination of the concept of white-collar crime online. Applying an offender-based perspective which considers the central role of convenience, it seeks to inform, improve and develop the current literature on cybercrime, whilst paying particular attention to its founding category within criminology. It argues that white-collar crime has receded from criminological perspectives on cybercrime in recent years and that a detailed, rich re-assessment of white-collar crime in contemporary digital societies is needed. Following a theoretical introduction, the book develops to discuss, inter alia, implications for corporate reputation, the various organizational roles utilized in mitigating external and internal threats, the unique considerations involved in law enforcement efforts, and likely future directions within the field. White-Collar Crime Online recognises the strong lineage and correlation that exists between the study of white-collar crime and cybercrime. Using convenience theory within a comparative analysis which includes case-studies, the book explores both European and American paradigms, perspectives and models to determine where white-collar crime exists within the contemporary workplace and how this might relate to the ongoing discourse on cybercrime. In doing so it revaluates criminological theory within the context of changing patterns of business, the workplace, social rules, systems of governance, decision making, social ordering and control. White-Collar Crime Online will speak to criminologists, sociologists and professionals; including those interested in cyber-security, economics, technology and computer science.

The Basics of Hacking and Penetration Testing - Ethical Hacking and Penetration Testing Made Easy (Paperback, 2nd edition):... The Basics of Hacking and Penetration Testing - Ethical Hacking and Penetration Testing Made Easy (Paperback, 2nd edition)
Patrick Engebretson
R731 R586 Discovery Miles 5 860 Save R145 (20%) Ships in 12 - 19 working days

"The Basics of Hacking and Penetration Testing "serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.
Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes theKali Linux distribution and focuses on the seminal tools required to complete a penetration test."

Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected... Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Guojun Wang, Kim-Kwang Raymond Choo, Ryan K.l. Ko, Yang Xu, Bruno Crispo
R2,413 Discovery Miles 24 130 Ships in 10 - 15 working days

This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.

Conquer the Web - The Ultimate Cybersecurity Guide (Paperback): Jonathan Reuvid Conquer the Web - The Ultimate Cybersecurity Guide (Paperback)
Jonathan Reuvid; Nick Wilding, Tim Mitchell, Maureen Kendal, Nick Ioannou
R445 R403 Discovery Miles 4 030 Save R42 (9%) Ships in 12 - 19 working days

This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it? 'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security Forum Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet or phone. How often do you make payments online? Do you have children and want to ensure they stay safe online? How often do you sit at a coffee shop and log onto their free WIFI? How often do you use social media on the train or bus? If you believe using an antivirus software will keep devices safe... you are wrong. This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks.This Guide covers areas such as: Building resilience into our IT Lifestyle Online Identity Cyber Abuse: Scenarios and Stories Protecting Devices Download and share Gaming, gamble and travel Copycat websites I Spy and QR Codes Banking, apps and Passwords Includes chapers from Nick Wilding, General Manager at AXELOS, Tim Mitchell, Content Director at Get Safe Online, Maureen Kendal, Director at Cybercare, Nick Ioannou, Founder of Boolean Logical, and CYBERAWARE. 'Conquer the Web is a full and comprehensive read for anyone wanting to know more about cyber-security. It takes it time to explain the many acronyms and jargon that are associated with our industry, and goes into detail where necessary.' Sarah Jane MD of Layer8 Ltd 'Online fraud, cyber bullying, identity theft and these are the unfortunate by products of the cyber age. The challenge is how do we protect ourselves in the online world? Conquer the Web provides practical guidance in an easy to understand language that allows readers to take a small number of steps that will greatly increase their online security. A must read for anyone looking to upskill their cyber awareness.' Steve Durbin MD of Information Security Forum Limited

Cyber Crisis Management - The Practical Handbook on Crisis Management and Crisis Communication (Paperback, 1st ed. 2021):... Cyber Crisis Management - The Practical Handbook on Crisis Management and Crisis Communication (Paperback, 1st ed. 2021)
Holger Kaschner
R2,249 Discovery Miles 22 490 Ships in 10 - 15 working days

Cyber attacks and IT breakdowns threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises. Structured in a practical manner, it is ideally suited for crisis team members, communicators, security, IT and data protection experts on a day-to-day basis. With numerous illustrations and checklists.This book is a translation of the original German 1st edition Cyber Crisis Management by Holger Kaschner, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors.

Critical Information Infrastructures Security - 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September... Critical Information Infrastructures Security - 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27-29, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Dimitri Percia David, Alain Mermoud, Thomas Maillart
R1,508 Discovery Miles 15 080 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on Critical Information Infrastructures Security, CRITIS 2021, which took place in Lausanne, Switzerland, during September 27-29, 2021.The 12 full papers included in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services.

The CISO's Transformation - Security Leadership in a High Threat Landscape (Paperback, 1st ed. 2021): Raj Badhwar The CISO's Transformation - Security Leadership in a High Threat Landscape (Paperback, 1st ed. 2021)
Raj Badhwar
R1,865 Discovery Miles 18 650 Ships in 10 - 15 working days

The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. In our new cyber threat-saturated world, CISOs have begun to show their market value. Wall Street is more likely to reward companies with good cybersecurity track records with higher stock valuations. To ensure that security is always a foremost concern in business decisions, CISOs should have a seat on corporate boards, and CISOs should be involved from beginning to end in the process of adopting enterprise technologies. The second and third sections of this book focus on building strong security teams, and exercising prudence in cybersecurity. CISOs can foster cultures of respect through careful consideration of the biases inherent in the socio-linguistic frameworks shaping our workplace language and through the cultivation of cyber exceptionalism. CISOs should leave no stone unturned in seeking out people with unique abilities, skills, and experience, and encourage career planning and development, in order to build and retain a strong talent pool. The lessons of the breach of physical security at the US Capitol, the hack back trend, and CISO legal liability stemming from network and data breaches all reveal the importance of good judgment and the necessity of taking proactive stances on preventative measures. This book will target security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs. Risk personnel, CROs, IT, security auditors and security researchers will also find this book useful.

Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event,... Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings (Paperback, 1st ed. 2021)
Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves
R1,922 Discovery Miles 19 220 Ships in 10 - 15 working days

This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.The 18 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 65 submissions. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Digital Robbery - ATM Hacking and Implications (Paperback, 1st ed. 2021): Shun-Yung Kevin Wang, Ming-Li Hsieh Digital Robbery - ATM Hacking and Implications (Paperback, 1st ed. 2021)
Shun-Yung Kevin Wang, Ming-Li Hsieh
R2,069 Discovery Miles 20 690 Ships in 10 - 15 working days

This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "ATM Hacking." It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution - First Commercial Bank,. Then it programmed dozens of ATMs to "spit out" millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of "turf jealousies." The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.

Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Hardcover): Ruth Taplin Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Hardcover)
Ruth Taplin
R4,774 Discovery Miles 47 740 Ships in 12 - 19 working days

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information ("big data") held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book assesses the major cyber risks to businesses and discusses how they can be managed and the risks reduced. It includes case studies of the situation in different financial sectors and countries in relation to East Asia, Europe and the United States. It takes an interdisciplinary approach assessing cyber risks and management solutions from an economic, management risk, legal, security intelligence, insurance, banking and cultural perspective.

Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected... Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Harley Eades III, Olga Gadyatskaya
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic. The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security.

Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September... Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
R3,197 Discovery Miles 31 970 Ships in 10 - 15 working days

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Elements of Style
William Strunk Hardcover R479 Discovery Miles 4 790
Intelligent Hybrid Systems - Fuzzy…
Da Ruan Hardcover R4,568 Discovery Miles 45 680
Context in Computing - A…
Patrick Brezillon, Avelino J. Gonzalez Hardcover R4,458 Discovery Miles 44 580
Abstraction in Artificial Intelligence…
Lorenza Saitta, Jean-Daniel Zucker Hardcover R4,192 Discovery Miles 41 920
Next-Generation Applications and…
Filipe Portela, Ricardo Queiros Hardcover R7,211 Discovery Miles 72 110
Extraordinary Indians
Khushwant Singh Hardcover R832 Discovery Miles 8 320
Automated Workflow Scheduling in…
G. Kousalya, P. Balakrishnan, … Hardcover R1,697 Discovery Miles 16 970
Perspectives on Language Assessment…
Sahbi Hidri Hardcover R4,469 Discovery Miles 44 690
Air Traffic Control Automated Systems
Bestugin A.R., Eshenko A.A., … Hardcover R3,395 Discovery Miles 33 950
Handheld Computing for Mobile Commerce…
Hardcover R5,048 Discovery Miles 50 480

 

Partners