![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Essential reading for launching a career in computer forensics Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crimeDetails the ways to conduct a computer forensics investigationHighlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witnessWalks you through identifying, collecting, and preserving computer evidenceExplains how to understand encryption and examine encryption files "Computer Forensics JumpStart" is the resource you need to launch a career in computer forensics.
Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is forThis ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.
You don t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of Windows-based development and memory management, and Game Hacking will teach you what you need to become a true game hacker. Learn the basics, like reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection, and hone your new skills with hands-on example code and practice binaries. Level up as you learn how to: Scan and modify memory with Cheat Engine Explore program structure and execution flow with OllyDbg Log processes and pinpoint useful data files with Process Monitor Manipulate control flow through NOPing, hooking, and more Locate and dissect common game memory structures You ll even discover the secrets behind common game bots, including: Extrasensory perception hacks, such as wallhac
Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is forIf you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters.
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Key Features Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Book DescriptionWeb Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. What you will learn Learn how to set up your lab with Kali Linux Understand the core concepts of web penetration testing Get to know the tools and techniques you need to use with Kali Linux Identify the difference between hacking a web application and network hacking Expose vulnerabilities present in web servers and their applications using server-side attacks Understand the different techniques used to identify the flavor of web applications See standard attacks such as exploiting cross-site request forgery and cross-site scripting flaws Get an overview of the art of client-side attacks Explore automated attacks such as fuzzing web applications Who this book is forSince this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must.
Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain " of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.
'A must read for anyone who wants to understand not only our media, but power in Britain' - OWEN JONES, author The Establishment 'Top court reporting' - NICK DAVIES, THE GUARDIAN Go behind the doors of Court 12 of the Old Bailey for what was billed as 'the trial of the century' - the phone hacking trial of journalists from Rupert Murdoch's two biggest British tabloid newspapers. Every twist and turn of the longest-running criminal trial in English legal history is covered by Peter Jukes in this edition, crowdfunded by members of the public. Heard in London in 2013 and 2014, the phone hacking trial had a heady brew of criminal eavesdropping, media rights, political intrigue, and Hollywood stardust. Rebekah Brooks and Andy Coulson were accused of phone hacking and corrupting public officials while editing the Sun and the News of the World newspapers respectively. Brooks and her husband Charlie and her former PA, Cheryl Carter, were also accused of perverting the course of justice in an attempt to thwart detectives investigating the hacking. The trial took place after years of cover up of phone hacking at Britain's biggest newspaper group News International (now News UK), the country's biggest police force, the Metropolitan Police, and the Conservative government led by David Cameron, who employed Coulson as his director of communications. After they were sworn in, the judge, Justice Saunders, told the jury: "British justice is on trial". The long-running trial laid bare the intense illegal surveillance of individuals carried out by the politically-connected News of the World. Employing an array of private detectives, pried deeply into the private lives of anyone who mattered to them at the time: a Hollywood actress, a missing schoolgirl, a Cabinet minister. Sometimes the surveillance was based on well-founded intelligence that revealed a legitimate story, sometimes it was on a whim or the result of a malicious tip-off. The trial pitted London's most extravagantly paid barristers against each other. Rupert Murdoch's millions hired top Queens Counsel to represent the seven defendants. The GBP5,000-a-day barrister, Jonathan Laidlaw, for instance, represented Rebekah Brooks. The multi-million pound case tottered on the brink of collapse several times as a result media misbehaviour, illness and delay. Drawing on verbatim court exchanges and exhibits, Jukes reveals the daily reality and grand strategies of this major criminal case. He reveals a secret about Rebekah Brooks' 14 days in the witness box. He explains why a defence lawyer gave him a wry smile during a cigarette break. And he discloses the failings of the Crown Prosecution Service which contribute to the verdicts. Like Dial M for Murdoch by Tom Watson and Martin Hickman and Hack Attack by Nick Davies, this book will fascinate anyone wanting to know about the phone hacking scandal. It is also ideal for anyone who wants to know the twists and turns of a major criminal trial. REVIEWS 'Remarkable. I feel I now know all the key players and why some defendants were found guilty and some not, despite never having spent a minute at the trial.' - PROFESSOR STEWART PURVIS, FORMER ITN EDITOR 'Written in a chatty, gossipy style that brings the courtroom drama alive.' - NIGEL PAULEY, DAILY STAR JOURNALIST
This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention. The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the number of successful attacks is increasing. The seeds of this book were sown three years ago when the author, a Professor of Forensic Software Engineering, was trying to recover his 20 year-old e-mail address from the clutches of spammers who had rendered it almost unusable with more than 140,000 junk messages a day. It got to the point where he was invited by his ISP to either change it or take it elsewhere. Instead he decided to find out how to prevent the deluge, acquired his own servers and began researching. The book is a mixture of analysis, experiment and implementation in almost equal proportions with detailed description of the defence in depth necessary to turn the tidal wave of junk aside leaving only what the end user wants to see - no more and no less. It covers: -
The book contains many illustrations of attacks and is supported by numerous code examples in Perl and C. Perfection is impossible, but if you follow the advice in this book, you can build mail systems which provably make no more than 5 mistakes per million messages received, very close to the definitive manufacturing standard of six sigma. The threat from viruses effectively disappears and the e-mail user is secured from toxic content.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend against today's most devious attacksFully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustratedby code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
Computers and the Internet play an increasingly pivotal role in
daily life, making it vitally important to understand the dynamics
of cybercrime and those victimized by it. The anthology "Cybercrime
and Criminological Theory: Fundamental Readings on Hacking, Piracy,
Theft, and Harassment" explores the predictors for participation in
various forms of cybercrime and deviance, from common problems like
media piracy, to more distinct offenses such as computer hacking.
Most criminological theories were developed to account for street
crimes, so it is unclear how these theories may apply to virtual
offending. This text provides critical insight into the utility of
multiple theories to account for cybercrimes. |
You may like...
Introduction to Cybercrime - Computer…
Joshua B. Hill, Nancy E. Marion
Hardcover
Hackers and Hacking - A Reference…
Thomas J. Holt, Bernadette H Schell
Hardcover
Managing Catastrophic Loss of Sensitive…
Constantine Photopoulos
Paperback
R1,265
Discovery Miles 12 650
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda
Paperback
R1,208
Discovery Miles 12 080
The Psychology of Cyber Crime - Concepts…
Grainne Kirwan, Andrew Power
Hardcover
R4,920
Discovery Miles 49 200
Cyber Crime and Cyber Terrorism…
Babak Akhgar, Andrew Staniforth, …
Paperback
R1,110
Discovery Miles 11 100
|