0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (27)
  • R500+ (294)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Satan's Gold - Money makes the world go 'round. Or stop. (Paperback): Michael Ray Ewing Satan's Gold - Money makes the world go 'round. Or stop. (Paperback)
Michael Ray Ewing
R493 Discovery Miles 4 930 Ships in 18 - 22 working days
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide - Keep up to date with ethical hacking trends and hone your skills with... Certified Ethical Hacker (CEH) v11 312-50 Exam Guide - Keep up to date with ethical hacking trends and hone your skills with hands-on activities (Paperback)
Dale Meredith, Christopher Rees
R1,163 Discovery Miles 11 630 Ships in 18 - 22 working days

Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is forThis ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.

Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware... Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware attacks (Paperback)
Jean-Georges Valle
R1,376 Discovery Miles 13 760 Ships in 18 - 22 working days

Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is forIf you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters.

Back Story - Large Print (Caught Dead In Wyoming, Book 6) (Large print, Paperback, Large type / large print edition): Patricia... Back Story - Large Print (Caught Dead In Wyoming, Book 6) (Large print, Paperback, Large type / large print edition)
Patricia McLinn
R654 R608 Discovery Miles 6 080 Save R46 (7%) Ships in 18 - 22 working days
Hot Roll - Large Print (Caught Dead In Wyoming, Book 8) (Large print, Paperback, Large type / large print edition): Patricia... Hot Roll - Large Print (Caught Dead In Wyoming, Book 8) (Large print, Paperback, Large type / large print edition)
Patricia McLinn
R656 R610 Discovery Miles 6 100 Save R46 (7%) Ships in 18 - 22 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
Bit By Bit (Large print, Hardcover, Large type / large print edition): Hanley Bit By Bit (Large print, Hardcover, Large type / large print edition)
Hanley; Edited by Christine A. Adams
R748 R542 Discovery Miles 5 420 Save R206 (28%) Ships in 9 - 17 working days
The Car Hacker's Handbook (Paperback): Craig Smith The Car Hacker's Handbook (Paperback)
Craig Smith
R1,281 R826 Discovery Miles 8 260 Save R455 (36%) Ships in 10 - 15 working days

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven t kept pace with today s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle s communication network, you ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker s Handbook will show you how to: Build an accurate threat model for

Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An... Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners (Hardcover)
Lester Evans
R846 R582 Discovery Miles 5 820 Save R264 (31%) Ships in 9 - 17 working days
Your Safety and Privacy Online - The CIA and NSA (Paperback): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Paperback)
Siggi Bjarnason
R290 R210 Discovery Miles 2 100 Save R80 (28%) Ships in 9 - 17 working days
Permanent Record (Paperback): Edward Snowden Permanent Record (Paperback)
Edward Snowden 1
R412 Discovery Miles 4 120 Ships in 4 - 6 working days

Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,146 Discovery Miles 11 460 Ships in 18 - 22 working days
How to Hack a Human: Cybersecurity for the Mind (Paperback): Raef Meeuwisse How to Hack a Human: Cybersecurity for the Mind (Paperback)
Raef Meeuwisse
R545 Discovery Miles 5 450 Ships in 18 - 22 working days
The Hacker Playbook 3 - Practical Guide to Penetration Testing (Paperback): Peter Kim The Hacker Playbook 3 - Practical Guide to Penetration Testing (Paperback)
Peter Kim
R738 Discovery Miles 7 380 Ships in 18 - 22 working days
Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition... Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition (Paperback, 3rd Revised edition)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari
R1,396 Discovery Miles 13 960 Ships in 18 - 22 working days

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Key Features Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Book DescriptionWeb Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. What you will learn Learn how to set up your lab with Kali Linux Understand the core concepts of web penetration testing Get to know the tools and techniques you need to use with Kali Linux Identify the difference between hacking a web application and network hacking Expose vulnerabilities present in web servers and their applications using server-side attacks Understand the different techniques used to identify the flavor of web applications See standard attacks such as exploiting cross-site request forgery and cross-site scripting flaws Get an overview of the art of client-side attacks Explore automated attacks such as fuzzing web applications Who this book is forSince this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must.

Hacking Exposed 7 (Paperback, 7th edition): Stuart McClure, Joel Scambray, George Kurtz Hacking Exposed 7 (Paperback, 7th edition)
Stuart McClure, Joel Scambray, George Kurtz
R1,577 R1,274 Discovery Miles 12 740 Save R303 (19%) Ships in 9 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself

How to Keep Your Stuff Safe Online (Paperback): Raef Meeuwisse How to Keep Your Stuff Safe Online (Paperback)
Raef Meeuwisse
R191 Discovery Miles 1 910 Ships in 18 - 22 working days
Cybersecurity: Home and Small Business (Paperback): Raef Meeuwisse Cybersecurity: Home and Small Business (Paperback)
Raef Meeuwisse
R318 Discovery Miles 3 180 Ships in 18 - 22 working days
Cybersecurity Exposed: The Cyber House Rules (Paperback): Raef Meeuwisse Cybersecurity Exposed: The Cyber House Rules (Paperback)
Raef Meeuwisse
R416 Discovery Miles 4 160 Ships in 9 - 17 working days
Cyber Crimes - History of World's Worst Cyber Attacks (Paperback): Vannesa Pitts Cyber Crimes - History of World's Worst Cyber Attacks (Paperback)
Vannesa Pitts
R425 Discovery Miles 4 250 Ships in 18 - 22 working days
Beyond Contempt - The Inside Story of the Phone Hacking Trial (Paperback): Peter Jukes Beyond Contempt - The Inside Story of the Phone Hacking Trial (Paperback)
Peter Jukes; Cover design or artwork by Martin Rowson
R439 Discovery Miles 4 390 Ships in 18 - 22 working days

'A must read for anyone who wants to understand not only our media, but power in Britain' - OWEN JONES, author The Establishment 'Top court reporting' - NICK DAVIES, THE GUARDIAN Go behind the doors of Court 12 of the Old Bailey for what was billed as 'the trial of the century' - the phone hacking trial of journalists from Rupert Murdoch's two biggest British tabloid newspapers. Every twist and turn of the longest-running criminal trial in English legal history is covered by Peter Jukes in this edition, crowdfunded by members of the public. Heard in London in 2013 and 2014, the phone hacking trial had a heady brew of criminal eavesdropping, media rights, political intrigue, and Hollywood stardust. Rebekah Brooks and Andy Coulson were accused of phone hacking and corrupting public officials while editing the Sun and the News of the World newspapers respectively. Brooks and her husband Charlie and her former PA, Cheryl Carter, were also accused of perverting the course of justice in an attempt to thwart detectives investigating the hacking. The trial took place after years of cover up of phone hacking at Britain's biggest newspaper group News International (now News UK), the country's biggest police force, the Metropolitan Police, and the Conservative government led by David Cameron, who employed Coulson as his director of communications. After they were sworn in, the judge, Justice Saunders, told the jury: "British justice is on trial". The long-running trial laid bare the intense illegal surveillance of individuals carried out by the politically-connected News of the World. Employing an array of private detectives, pried deeply into the private lives of anyone who mattered to them at the time: a Hollywood actress, a missing schoolgirl, a Cabinet minister. Sometimes the surveillance was based on well-founded intelligence that revealed a legitimate story, sometimes it was on a whim or the result of a malicious tip-off. The trial pitted London's most extravagantly paid barristers against each other. Rupert Murdoch's millions hired top Queens Counsel to represent the seven defendants. The GBP5,000-a-day barrister, Jonathan Laidlaw, for instance, represented Rebekah Brooks. The multi-million pound case tottered on the brink of collapse several times as a result media misbehaviour, illness and delay. Drawing on verbatim court exchanges and exhibits, Jukes reveals the daily reality and grand strategies of this major criminal case. He reveals a secret about Rebekah Brooks' 14 days in the witness box. He explains why a defence lawyer gave him a wry smile during a cigarette break. And he discloses the failings of the Crown Prosecution Service which contribute to the verdicts. Like Dial M for Murdoch by Tom Watson and Martin Hickman and Hack Attack by Nick Davies, this book will fascinate anyone wanting to know about the phone hacking scandal. It is also ideal for anyone who wants to know the twists and turns of a major criminal trial. REVIEWS 'Remarkable. I feel I now know all the key players and why some defendants were found guilty and some not, despite never having spent a minute at the trial.' - PROFESSOR STEWART PURVIS, FORMER ITN EDITOR 'Written in a chatty, gossipy style that brings the courtroom drama alive.' - NIGEL PAULEY, DAILY STAR JOURNALIST

E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback): Les Hatton E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback)
Les Hatton
R936 Discovery Miles 9 360 Ships in 18 - 22 working days

This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention.

The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the number of successful attacks is increasing.

The seeds of this book were sown three years ago when the author, a Professor of Forensic Software Engineering, was trying to recover his 20 year-old e-mail address from the clutches of spammers who had rendered it almost unusable with more than 140,000 junk messages a day. It got to the point where he was invited by his ISP to either change it or take it elsewhere. Instead he decided to find out how to prevent the deluge, acquired his own servers and began researching.

The book is a mixture of analysis, experiment and implementation in almost equal proportions with detailed description of the defence in depth necessary to turn the tidal wave of junk aside leaving only what the end user wants to see - no more and no less. It covers: -

  • 1. The rise of e-mail
  • 2. How it all works
  • 3. Scams, spam and other abuse
  • 4. Protection: the principles of filtering
  • 5. Going deeper: setting up a mail server
  • 6. Advanced content filtering
  • 7. The bottom line - how well can we do ?
  • 8. Where is all this going ?
There is something here for everyone. Chapters 1-4 are suitable for the general reader who just wants to understand how spammers and scammers work and find out a little more about the many forms of attack. Chapters 5 and 6 are highly technical and suitable for both e-mail administrators and theoreticians and include a discussion of the latest computational and mathematical techniques for detecting textual patterns. Chapter 7 presents the results of applying the techniques in this book on the several million junk messages the author's servers received over a 10 month period. Chapter 8 tries to see into the future a little to predict how the arms race between the attackers and defenders might go. Finally, those interested in governance will find discussions of the dangers of release of e-mail addresses under Freedom of Information Requests.

The book contains many illustrations of attacks and is supported by numerous code examples in Perl and C.

Perfection is impossible, but if you follow the advice in this book, you can build mail systems which provably make no more than 5 mistakes per million messages received, very close to the definitive manufacturing standard of six sigma. The threat from viruses effectively disappears and the e-mail user is secured from toxic content.

Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition): Mike Shema Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition)
Mike Shema
R1,300 R1,103 Discovery Miles 11 030 Save R197 (15%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend against today's most devious attacksFully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustratedby code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis: WDFIA 2012 (Paperback): Nathan... Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis: WDFIA 2012 (Paperback)
Nathan Clarke, Theodore Tryfonas, Ronald Dodge
R530 Discovery Miles 5 300 Ships in 18 - 22 working days

The field of digital forensics is rapidly evolving and continues to gain significance in both the law enforcement and the scientific community. Being intrinsically interdisciplinary, it draws upon a wide range of subject areas such as information & communication technologies, law, social sciences and business administration. With this in mind, the workshop on Digital Forensics and Incident Analysis (WDFIA) specifically addresses this multi-facetted aspect, with papers invited from the full spectrum of issues relating to digital forensics and incident analysis. This book represents the proceedings from the 2012 event, which was held in Crete, Greece. A total of 13 papers are included, spanning a range of topics including systems and network investigation, services and applications and supporting the forensic process. All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.

Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback): Thomas J.... Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback)
Thomas J. Holt
R4,858 Discovery Miles 48 580 Ships in 18 - 22 working days

Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and those victimized by it. The anthology "Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment" explores the predictors for participation in various forms of cybercrime and deviance, from common problems like media piracy, to more distinct offenses such as computer hacking. Most criminological theories were developed to account for street crimes, so it is unclear how these theories may apply to virtual offending. This text provides critical insight into the utility of multiple theories to account for cybercrimes.
"Cybercrime and Criminological Theory" gives direct insight into the rates and prevalence of cybercrime offenses using data sets from populations across the United States. It gives readers a fundamental understanding of, and appreciation for various forms of cybercrime, and outlines prospective predictors of both offending and victimization. The selected readings identify research questions that must be addressed in order to improve the legal, technical, and policy responses to cybercrimes.
"Cybercrime and Criminological Theory" begins with an introduction to cybercrime and virtual criminality. From there, the book offers five sections featuring seminal and cutting edge works on topics in:
- Routine Activities Theory
- Deterrence Theory
- Social Learning and Self Control
- General Strain Theory
- Deviant Subcultures
The book uses articles and cutting-edge research in the field to create a text that is relevant for students at all levels of study, as well as scholars in criminology, sociology, and information security. Undergraduate students will gain insight into the value of various theories to account for victimization and offending, and learn basic research methods applied by criminologists to assess crime and victimization. Graduate students benefit from the detail provided on research methods, measurement, and research questions that must be addressed to fully understand cybercrimes.
Thomas J. Holt earned his Ph.D. at the University of Missouri, Saint Louis. He is currently an Associate Professor in the School of Criminal Justice at Michigan State University. His areas of research include computer hacking, malware, and the role played by technology and computer-mediated communications in facilitating crime and deviance. Dr. Holt is the co-author of "Digital Crime and Digital Terror," and the co-editor of "Corporate Hacking and Technology-Driven Crime." He is also the editor of the book "Cybercrime: Causes, Correlates, and Context." His work has also been published in numerous academic journals, including "Crime and Delinquency," "Deviant Behavior," and the "Journal of Criminal Justice." Dr. Holt received two grants from the U.S. National Institute of Justice to examine the market for malicious software, and the social dynamics of carders and on-line data thieves. Additionally, he is the project lead for the Spartan Devils Chapter of the Honeynet Project, and directs the MSU Open Source Research Laboratory, which explores cyber threats around the globe through on-line research.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hackers and Hacking - A Reference…
Thomas J. Holt, Bernadette H Schell Hardcover R1,745 Discovery Miles 17 450
The Psychology of Cyber Crime - Concepts…
Grainne Kirwan, Andrew Power Hardcover R4,920 Discovery Miles 49 200
No Tech Hacking - A Guide to Social…
Johnny Long Paperback R994 R833 Discovery Miles 8 330
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
This Is How They Tell Me the World Ends…
Nicole Perlroth Paperback R324 R297 Discovery Miles 2 970
Seven Deadliest Web Application Attacks
Mike Shema Paperback R577 Discovery Miles 5 770
Advanced Persistent Threat…
Eric Cole Paperback R1,111 Discovery Miles 11 110
Ninja Hacking - Unconventional…
Thomas Wilhelm, Jason Andress Paperback R781 Discovery Miles 7 810
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,233 Discovery Miles 22 330
XBOX 360 Forensics - A Digital Forensics…
Steven Bolt Paperback R1,141 Discovery Miles 11 410

 

Partners