0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (31)
  • R500+ (305)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised... Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers (Paperback, 1st ed. 2019)
Gilbert Peterson, Sujeet Shenoi
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: forensic models, mobile and embedded device forensics, filesystem forensics, image forensics, and forensic techniques. This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. Advances in Digital Forensics XV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Secure Communications - Applications and Management (Hardcover): R.J. Sutton Secure Communications - Applications and Management (Hardcover)
R.J. Sutton
R3,845 Discovery Miles 38 450 Ships in 12 - 17 working days

If you need to know more about communication's security management, this is the perfect book for you………

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.

  • Explains the practical links between cryptography and telecommunications

  • Addresses the pertinent issues of implementation of cryptography as a method of protecting information

  • Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material

  • Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection

  • Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on……….
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security... Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security (Paperback, 1st ed. 2019)
Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
R1,856 Discovery Miles 18 560 Ships in 10 - 15 working days

Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019. This project has developed a new class of technologies called Adaptive Cyber Defense (ACD) by building on two active but heretofore separate research areas: Adaptation Techniques (AT) and Adversarial Reasoning (AR). AT methods introduce diversity and uncertainty into networks, applications, and hosts. AR combines machine learning, behavioral science, operations research, control theory, and game theory to address the goal of computing effective strategies in dynamic, adversarial environments.

Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings... Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings (Paperback, 1st ed. 2019)
Hilde Perez Garcia, Lidia Sanchez Gonzalez, Manuel Castejon Limas, Hector Quintian Pardo, Emilio Corchado Rodriguez
R1,750 Discovery Miles 17 500 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019. The 64 full papers published in this volume were carefully reviewed and selected from 134 submissions. They are organized in the following topical sections: data mining, knowledge discovery and big data; bio-inspired models and evolutionary computation; learning algorithms; visual analysis and advanced data processing techniques; data mining applications; and hybrid intelligent applications.

Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg,... Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings (Paperback, 1st ed. 2019)
Roberto Perdisci, Clementine Maurice, Giorgio Giacinto, Magnus Almgren
R2,313 Discovery Miles 23 130 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.

Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linkoeping, Sweden, September... Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linkoeping, Sweden, September 23-25, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Simin Nadjm-Tehrani
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linkoeping, Sweden, in September 2019.The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.

Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7,... Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Sokratis K. Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Anton, …
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

Cybersecurity Awareness Among Students and Faculty (Hardcover): Abbas Moallem Cybersecurity Awareness Among Students and Faculty (Hardcover)
Abbas Moallem
R1,819 Discovery Miles 18 190 Ships in 12 - 17 working days

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Fraud Prevention in Online Digital Advertising (Paperback, 1st ed. 2017): Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao,... Fraud Prevention in Online Digital Advertising (Paperback, 1st ed. 2017)
Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish, …
R2,007 Discovery Miles 20 070 Ships in 10 - 15 working days

The authors systematically review methods of online digital advertising (ad) fraud and the techniques to prevent and defeat such fraud in this brief. The authors categorize ad fraud into three major categories, including (1) placement fraud, (2) traffic fraud, and (3) action fraud. It summarizes major features of each type of fraud, and also outlines measures and resources to detect each type of fraud. This brief provides a comprehensive guideline to help researchers understand the state-of-the-art in ad fraud detection. It also serves as a technical reference for industry to design new techniques and solutions to win the battle against fraud.

Cyber Mercenaries - The State, Hackers, and Power (Hardcover): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Hardcover)
Tim Maurer
R2,033 R1,790 Discovery Miles 17 900 Save R243 (12%) Ships in 12 - 17 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Cyber Mercenaries - The State, Hackers, and Power (Paperback): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Paperback)
Tim Maurer
R842 R732 Discovery Miles 7 320 Save R110 (13%) Ships in 10 - 15 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

How to Hack a Human: Cybersecurity for the Mind (Paperback): Raef Meeuwisse How to Hack a Human: Cybersecurity for the Mind (Paperback)
Raef Meeuwisse
R611 Discovery Miles 6 110 Ships in 10 - 15 working days
Principles of Cybercrime (Hardcover, 2nd Revised edition): Jonathan Clough Principles of Cybercrime (Hardcover, 2nd Revised edition)
Jonathan Clough
R2,766 Discovery Miles 27 660 Ships in 12 - 17 working days

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.

Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context (Paperback, 1st ed. 2022): Leonhard Kunczik Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context (Paperback, 1st ed. 2022)
Leonhard Kunczik
R2,229 Discovery Miles 22 290 Ships in 12 - 17 working days

This book explores the combination of Reinforcement Learning and Quantum Computing in the light of complex attacker-defender scenarios. Reinforcement Learning has proven its capabilities in different challenging optimization problems and is now an established method in Operations Research. However, complex attacker-defender scenarios have several characteristics that challenge Reinforcement Learning algorithms, requiring enormous computational power to obtain the optimal solution. The upcoming field of Quantum Computing is a promising path for solving computationally complex problems. Therefore, this work explores a hybrid quantum approach to policy gradient methods in Reinforcement Learning. It proposes a novel quantum REINFORCE algorithm that enhances its classical counterpart by Quantum Variational Circuits. The new algorithm is compared to classical algorithms regarding the convergence speed and memory usage on several attacker-defender scenarios with increasing complexity. In addition, to study its applicability on today's NISQ hardware, the algorithm is evaluated on IBM's quantum computers, which is accompanied by an in-depth analysis of the advantages of Quantum Reinforcement Learning.

Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback): Occupytheweb Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback)
Occupytheweb
R919 R752 Discovery Miles 7 520 Save R167 (18%) Ships in 12 - 17 working days

Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you'll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.

Deconstruction Machines - Writing in the Age of Cyberwar (Paperback): Justin Joque Deconstruction Machines - Writing in the Age of Cyberwar (Paperback)
Justin Joque; Foreword by Catherine Malabou
R711 R658 Discovery Miles 6 580 Save R53 (7%) Ships in 12 - 17 working days

A bold new theory of cyberwar argues that militarized hacking is best understood as a form of deconstruction From shadowy attempts to steal state secrets to the explosive destruction of Iranian centrifuges, cyberwar has been a vital part of statecraft for nearly thirty years. But although computer-based warfare has been with us for decades, it has changed dramatically since its emergence in the 1990s, and the pace of change is accelerating. In Deconstruction Machines, Justin Joque inquires into the fundamental nature of cyberwar through a detailed investigation of what happens at the crisis points when cybersecurity systems break down and reveal their internal contradictions. He concludes that cyberwar is best envisioned as a series of networks whose constantly shifting connections shape its very possibilities. He ultimately envisions cyberwar as a form of writing, advancing the innovative thesis that cyber attacks should be seen as a militarized form of deconstruction in which computer programs are systems that operate within the broader world of texts. Throughout, Joque addresses hot-button subjects such as technological social control and cyber-resistance entities like Anonymous and Wikileaks while also providing a rich, detailed history of cyberwar. Deconstruction Machines provides a necessary new interpretation of deconstruction and timely analysis of media, war, and technology.

IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,460 Discovery Miles 24 600 Ships in 12 - 17 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Cyber Fraud - Tactics, Techniques and Procedures (Paperback): Rick Howard Cyber Fraud - Tactics, Techniques and Procedures (Paperback)
Rick Howard
R1,963 Discovery Miles 19 630 Ships in 12 - 17 working days

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy. Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas. This eye-opening work includes a variety of case studies including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network's (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback): Jasper van Woudenberg, Colin... The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback)
Jasper van Woudenberg, Colin O'flynn
R1,077 R966 Discovery Miles 9 660 Save R111 (10%) Ships in 12 - 17 working days

The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

Hacking - The Art Of Exploitation (Paperback, 2nd Revised edition): Jon Erickson Hacking - The Art Of Exploitation (Paperback, 2nd Revised edition)
Jon Erickson 1
R1,390 R939 Discovery Miles 9 390 Save R451 (32%) Ships in 12 - 17 working days

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, ex

Cybercrime & its Implications (Paperback): Charles Doyle Cybercrime & its Implications (Paperback)
Charles Doyle
R1,226 R1,147 Discovery Miles 11 470 Save R79 (6%) Ships in 12 - 17 working days

The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimises computer systems. It is a computer security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills crack and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of section 1030 and some of its federal statutory companions. Subsection 1030(b) makes it a crime to attempt to commit any of these offences. Subsection 1030(c) catalogues the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action of victims of these crimes.

Computer Attack & Cyberterrorism (Paperback): Clay Wilson Computer Attack & Cyberterrorism (Paperback)
Clay Wilson
R1,684 R1,136 Discovery Miles 11 360 Save R548 (33%) Ships in 12 - 17 working days

Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a co-ordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists' goals. While there is no published evidence that terrorist organisations are currently planning a co-ordinated attack against computers, computer system vulnerabilities persist world-wide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called "bots", that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The book also describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. Issues for Congress may include how could trends in cyberattacks be measured more effectively; what is appropriate guidance for DOD use of cyberweapons; should cybersecurity be combined with, or remain separate from, the physical security organization within DHS; how can commercial vendors be encouraged to improve the security of their products; and what are options to encourage U.S. citizens to follow better cybersecurity practices? Appendices to this book describe computer viruses, spyware, and "bot networks", and how malicious programs are used to enable cybercrime and cyberespionage. Also, similarities are drawn between planning tactics currently used by computer hackers and those used by terrorists groups for conventional attacks.

Cybercrime Prevention - Theory and Applications (Hardcover, 1st ed. 2019): Russell Brewer, Melissa De Vel-Palumbo, Alice... Cybercrime Prevention - Theory and Applications (Hardcover, 1st ed. 2019)
Russell Brewer, Melissa De Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, …
R1,705 R1,319 Discovery Miles 13 190 Save R386 (23%) Ships in 12 - 17 working days

This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an overview of the key principles, concepts and research literature associated with crime prevention, and discusses the interventions most commonly applied to crime problems. The authors review the theoretical underpinnings of these and analyses evidence for their efficacy. Cybercrime Prevention is split into three sections which examine primary prevention, secondary prevention and tertiary prevention. It provides a thorough discussion of what works and what does not, and offers a formulaic account of how traditional crime prevention interventions can be reimagined to apply to the digital realm.

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R1,096 R738 Discovery Miles 7 380 Save R358 (33%) Ships in 12 - 17 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

Computers Under Attack - Intruders, Worms and Viruses (Paperback, New): Peter Denning Computers Under Attack - Intruders, Worms and Viruses (Paperback, New)
Peter Denning
R1,155 Discovery Miles 11 550 Ships in 10 - 15 working days

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The fifth part of the book gives a glimpse of the worlds in which hackers live. The final part deals with the social context in which people make ethical and moral interpretations and propose new laws.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Our Long Walk To Economic Freedom…
Johan Fourie Paperback R412 Discovery Miles 4 120
The Palestine Laboratory - How Israel…
Antony Loewenstein Paperback R300 R277 Discovery Miles 2 770
Beauty from Ashes - A Modern-Day…
Mattie Patrick Hardcover R837 Discovery Miles 8 370
Biker Gangs and Transnational Organized…
Thomas Barker Hardcover R5,782 Discovery Miles 57 820
The Nourishing Cook - A Guide to Inspire…
Leah Itsines Paperback R450 R356 Discovery Miles 3 560
Pathways to Adolescent Male Violent…
Sally-Ann Ashton Hardcover R1,601 Discovery Miles 16 010
Die Wet Van Gauteng
Hannes Barnard Paperback R370 R347 Discovery Miles 3 470
Intermezzo
Sally Rooney Paperback R410 R366 Discovery Miles 3 660
Suspect
Scott Turow Paperback R473 Discovery Miles 4 730
One Life - Short Stories
Joanne Hichens, Karina M. Szczurek Paperback R320 R284 Discovery Miles 2 840

 

Partners