0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (28)
  • R500+ (307)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September... Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
R2,951 Discovery Miles 29 510 Ships in 18 - 22 working days

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event,... Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings (Paperback, 1st ed. 2021)
Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves
R1,777 Discovery Miles 17 770 Ships in 18 - 22 working days

This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.The 18 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 65 submissions. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Secure Communications - Applications and Management (Hardcover): R.J. Sutton Secure Communications - Applications and Management (Hardcover)
R.J. Sutton
R3,550 Discovery Miles 35 500 Ships in 10 - 15 working days

If you need to know more about communication's security management, this is the perfect book for you………

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.

  • Explains the practical links between cryptography and telecommunications

  • Addresses the pertinent issues of implementation of cryptography as a method of protecting information

  • Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material

  • Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection

  • Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on……….
Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linkoeping, Sweden, September... Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linkoeping, Sweden, September 23-25, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Simin Nadjm-Tehrani
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linkoeping, Sweden, in September 2019.The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.

Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings... Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings (Paperback, 1st ed. 2019)
Hilde Perez Garcia, Lidia Sanchez Gonzalez, Manuel Castejon Limas, Hector Quintian Pardo, Emilio Corchado Rodriguez
R1,542 Discovery Miles 15 420 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019. The 64 full papers published in this volume were carefully reviewed and selected from 134 submissions. They are organized in the following topical sections: data mining, knowledge discovery and big data; bio-inspired models and evolutionary computation; learning algorithms; visual analysis and advanced data processing techniques; data mining applications; and hybrid intelligent applications.

Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected... Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Harley Eades III, Olga Gadyatskaya
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic. The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security.

Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK,... Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
George Hatzivasilis, Sotiris Ioannidis
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.

Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020): Leslie F Sikos, Kim-Kwang Raymond Choo Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020)
Leslie F Sikos, Kim-Kwang Raymond Choo
R5,143 Discovery Miles 51 430 Ships in 18 - 22 working days

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and... Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation - 4th International Conference, ICC3 2019, Coimbatore, India, December 19-21, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Suresh Balusamy, Alexander N. Dudin, Manuel Grana, A. Kaja Mohideen, N. K. Sreelaja, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019. The 9 papers presented in this volume were carefully reviewed and selected from 38 submissions. They were organized in topical sections named: computational intelligence; cyber security; and computational models.

Deployable Machine Learning for Security Defense - First International Workshop, MLHat 2020, San Diego, CA, USA, August 24,... Deployable Machine Learning for Security Defense - First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings (Paperback, 1st ed. 2020)
Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh
R2,087 Discovery Miles 20 870 Ships in 18 - 22 working days

This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security Defense, MLHat 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers were thoroughly reviewed and selected from 13 qualified submissions. The papers are organized in the following topical sections: understanding the adversaries; adversarial ML for better security; threats on networks.

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security... Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security (Paperback, 1st ed. 2019)
Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
R1,634 Discovery Miles 16 340 Ships in 18 - 22 working days

Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019. This project has developed a new class of technologies called Adaptive Cyber Defense (ACD) by building on two active but heretofore separate research areas: Adaptation Techniques (AT) and Adversarial Reasoning (AR). AT methods introduce diversity and uncertainty into networks, applications, and hosts. AR combines machine learning, behavioral science, operations research, control theory, and game theory to address the goal of computing effective strategies in dynamic, adversarial environments.

Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg,... Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings (Paperback, 1st ed. 2019)
Roberto Perdisci, Clementine Maurice, Giorgio Giacinto, Magnus Almgren
R2,034 Discovery Miles 20 340 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.

Cyber Fraud - Tactics, Techniques and Procedures (Hardcover): Rick Howard Cyber Fraud - Tactics, Techniques and Procedures (Hardcover)
Rick Howard
R3,831 Discovery Miles 38 310 Ships in 10 - 15 working days

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy.

Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.

This eye-opening work includes a variety of case studies including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7,... Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Sokratis K. Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Anton, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

Ethical Hacking (Paperback): Alana Maurushat Ethical Hacking (Paperback)
Alana Maurushat
R874 Discovery Miles 8 740 Ships in 18 - 22 working days

How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause-political or otherwise-which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La premiere moitie du XXIe siecle sera sans doute reconnue comme l'epoque ou le piratage ethique a ouvert de force les gouvernements, deplacant les limites de la transparence. La page twitter de Wikileaks enchasse cet ethos a meme sa devise, " we open governments ", et sa volonte d'etre omnipresent. En parallele, les grandes societes de technologie comme Apple se font competition pour produire des produits de plus en plus securitaires et a proteger les donnees de leurs clients, alors meme que les gouvernements tentent de limiter et de decrypter ces nouvelles technologies d'encryption. Entre-temps, le marche des vulnerabilites en matiere de securite augmente a mesure que les experts en securite informatique vendent des vulnerabilites de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 a 1,5 million de dollars. L'activisme en securite est a la hausse. Le piratage ethique est l'utilisation non-violence d'une technologie quelconque en soutien d'une cause politique ou autre qui est souvent ambigue d'un point de vue juridique et moral. Le hacking ethique peut designer les actes de verification de penetration professionnelle ou d'experts en securite informatique, de meme que d'autres formes d'actions emergentes, comme l'hacktivisme et la desobeissance civile en ligne. L'hacktivisme est une forme de piratage ethique, mais egalement une forme de militantisme des droits civils a l'ere numerique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertes fondamentales, y compris la liberte d'expression et a la vie privee, et la responsabilite des gouvernements d'etre ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antecedents comme les agendas des hacktivistes sont fort diversifies. Il n'est pas clair de quelle facon les tribunaux et les gouvernements traiteront des tentatives de piratage eu egard aux zones grises juridiques, aux approches ethiques conflictuelles, et compte tenu du fait qu'il n'existe actuellement, dans le monde, presque aucune exception aux provisions, en matiere de cybercrime et de crime informatique, liees a la recherche sur la securite ou l'interet public. Il sera egalement difficile de determiner le lien entre hacktivisme et droits civils. Ce livre est publie en anglais.

Cyber Mercenaries - The State, Hackers, and Power (Hardcover): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Hardcover)
Tim Maurer
R1,874 R1,710 Discovery Miles 17 100 Save R164 (9%) Ships in 10 - 15 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Cyber Mercenaries - The State, Hackers, and Power (Paperback): Tim Maurer Cyber Mercenaries - The State, Hackers, and Power (Paperback)
Tim Maurer
R777 R681 Discovery Miles 6 810 Save R96 (12%) Ships in 18 - 22 working days

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.):... Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.)
Carey Parker
R979 R858 Discovery Miles 8 580 Save R121 (12%) Ships in 18 - 22 working days

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!

Principles of Cybercrime (Hardcover, 2nd Revised edition): Jonathan Clough Principles of Cybercrime (Hardcover, 2nd Revised edition)
Jonathan Clough
R2,664 Discovery Miles 26 640 Ships in 10 - 15 working days

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.

Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context (Paperback, 1st ed. 2022): Leonhard Kunczik Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context (Paperback, 1st ed. 2022)
Leonhard Kunczik
R2,061 Discovery Miles 20 610 Ships in 10 - 15 working days

This book explores the combination of Reinforcement Learning and Quantum Computing in the light of complex attacker-defender scenarios. Reinforcement Learning has proven its capabilities in different challenging optimization problems and is now an established method in Operations Research. However, complex attacker-defender scenarios have several characteristics that challenge Reinforcement Learning algorithms, requiring enormous computational power to obtain the optimal solution. The upcoming field of Quantum Computing is a promising path for solving computationally complex problems. Therefore, this work explores a hybrid quantum approach to policy gradient methods in Reinforcement Learning. It proposes a novel quantum REINFORCE algorithm that enhances its classical counterpart by Quantum Variational Circuits. The new algorithm is compared to classical algorithms regarding the convergence speed and memory usage on several attacker-defender scenarios with increasing complexity. In addition, to study its applicability on today's NISQ hardware, the algorithm is evaluated on IBM's quantum computers, which is accompanied by an in-depth analysis of the advantages of Quantum Reinforcement Learning.

Digital Culture & Society (DCS) - Vol. 3, Issue 1/2017 - Making and Hacking (Paperback): Annika Richterich, Karin Wenz, Pablo... Digital Culture & Society (DCS) - Vol. 3, Issue 1/2017 - Making and Hacking (Paperback)
Annika Richterich, Karin Wenz, Pablo Abend, Mathias Fuchs, Ramon Reichert
R1,499 Discovery Miles 14 990 Ships in 10 - 15 working days

Digital Culture & Society is a refereed, international journal, fostering discussion about the ways in which digital technologies, platforms and applications reconfigure daily lives and practices. It offers a forum for inquiries into digital media theory, methodologies, and socio-technological developments. The fourth issue "Making and Hacking" sheds light on the communities and spaces of hackers, makers, DIY enthusiasts, and 'fabbers'. Academics, artists, and hackerspace members examine the meanings and entanglements of maker and hacker cultures - from conceptual, methodological as well as empirical perspectives. With contributions by Sabine Hielscher, Jeremy Hunsinger, Kat Braybrooke, Tim Jordan, among others, and an interview with Sebastian Kubitschko.

IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,274 Discovery Miles 22 740 Ships in 10 - 15 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Cyber Fraud - Tactics, Techniques and Procedures (Paperback): Rick Howard Cyber Fraud - Tactics, Techniques and Procedures (Paperback)
Rick Howard
R1,816 Discovery Miles 18 160 Ships in 10 - 15 working days

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy. Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas. This eye-opening work includes a variety of case studies including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network's (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback): Occupytheweb Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback)
Occupytheweb
R844 Discovery Miles 8 440 Ships in 10 - 15 working days

Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you'll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.

Cybersecurity Awareness Among Students and Faculty (Hardcover): Abbas Moallem Cybersecurity Awareness Among Students and Faculty (Hardcover)
Abbas Moallem
R1,711 Discovery Miles 17 110 Ships in 10 - 15 working days

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rhapsody: Marl Kingdom Chronicles…
R1,448 R1,052 Discovery Miles 10 520
Stardew Valley
R735 Discovery Miles 7 350
Saviors of Sapphire Wings and Stranger…
R1,392 R1,014 Discovery Miles 10 140
Spirit Hunter: NG
R960 Discovery Miles 9 600
Fallout 4
 (4)
R310 Discovery Miles 3 100
Persona 5: Tactica
R347 R272 Discovery Miles 2 720
Call of Duty: Black Ops 7
R1,523 Discovery Miles 15 230
The Legend of Heroes: Trails From Zero…
R1,392 R1,011 Discovery Miles 10 110
Dragon Quest VIII: Journey of the Cursed…
 (2)
R1,108 Discovery Miles 11 080
Disgaea 6: Defiance of Destiny…
R1,527 R913 Discovery Miles 9 130

 

Partners