0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (29)
  • R500+ (296)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition): Mike Shema Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition)
Mike Shema
R1,300 R1,103 Discovery Miles 11 030 Save R197 (15%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend against today's most devious attacksFully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustratedby code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback): Thomas J.... Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback)
Thomas J. Holt
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and those victimized by it. The anthology "Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment" explores the predictors for participation in various forms of cybercrime and deviance, from common problems like media piracy, to more distinct offenses such as computer hacking. Most criminological theories were developed to account for street crimes, so it is unclear how these theories may apply to virtual offending. This text provides critical insight into the utility of multiple theories to account for cybercrimes.
"Cybercrime and Criminological Theory" gives direct insight into the rates and prevalence of cybercrime offenses using data sets from populations across the United States. It gives readers a fundamental understanding of, and appreciation for various forms of cybercrime, and outlines prospective predictors of both offending and victimization. The selected readings identify research questions that must be addressed in order to improve the legal, technical, and policy responses to cybercrimes.
"Cybercrime and Criminological Theory" begins with an introduction to cybercrime and virtual criminality. From there, the book offers five sections featuring seminal and cutting edge works on topics in:
- Routine Activities Theory
- Deterrence Theory
- Social Learning and Self Control
- General Strain Theory
- Deviant Subcultures
The book uses articles and cutting-edge research in the field to create a text that is relevant for students at all levels of study, as well as scholars in criminology, sociology, and information security. Undergraduate students will gain insight into the value of various theories to account for victimization and offending, and learn basic research methods applied by criminologists to assess crime and victimization. Graduate students benefit from the detail provided on research methods, measurement, and research questions that must be addressed to fully understand cybercrimes.
Thomas J. Holt earned his Ph.D. at the University of Missouri, Saint Louis. He is currently an Associate Professor in the School of Criminal Justice at Michigan State University. His areas of research include computer hacking, malware, and the role played by technology and computer-mediated communications in facilitating crime and deviance. Dr. Holt is the co-author of "Digital Crime and Digital Terror," and the co-editor of "Corporate Hacking and Technology-Driven Crime." He is also the editor of the book "Cybercrime: Causes, Correlates, and Context." His work has also been published in numerous academic journals, including "Crime and Delinquency," "Deviant Behavior," and the "Journal of Criminal Justice." Dr. Holt received two grants from the U.S. National Institute of Justice to examine the market for malicious software, and the social dynamics of carders and on-line data thieves. Additionally, he is the project lead for the Spartan Devils Chapter of the Honeynet Project, and directs the MSU Open Source Research Laboratory, which explores cyber threats around the globe through on-line research.

Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis: WDFIA 2012 (Paperback): Nathan... Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis: WDFIA 2012 (Paperback)
Nathan Clarke, Theodore Tryfonas, Ronald Dodge
R530 Discovery Miles 5 300 Ships in 18 - 22 working days

The field of digital forensics is rapidly evolving and continues to gain significance in both the law enforcement and the scientific community. Being intrinsically interdisciplinary, it draws upon a wide range of subject areas such as information & communication technologies, law, social sciences and business administration. With this in mind, the workshop on Digital Forensics and Incident Analysis (WDFIA) specifically addresses this multi-facetted aspect, with papers invited from the full spectrum of issues relating to digital forensics and incident analysis. This book represents the proceedings from the 2012 event, which was held in Crete, Greece. A total of 13 papers are included, spanning a range of topics including systems and network investigation, services and applications and supporting the forensic process. All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.

China's Cyberwarfare Capability (Paperback, New): Elisabette M. Marvel China's Cyberwarfare Capability (Paperback, New)
Elisabette M. Marvel
R1,284 R983 Discovery Miles 9 830 Save R301 (23%) Ships in 10 - 15 working days

The government of the People's Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.

Underground - Tales of Hacking, Madness and Obsession on the Electronic Frontier (Paperback, Main): Julian Assange, Suelette... Underground - Tales of Hacking, Madness and Obsession on the Electronic Frontier (Paperback, Main)
Julian Assange, Suelette Dreyfus
R492 R405 Discovery Miles 4 050 Save R87 (18%) Ships in 10 - 15 working days

Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took on the establishment. Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail. As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

Kingpin - The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network (Paperback): Kevin... Kingpin - The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network (Paperback)
Kevin Poulsen
R696 Discovery Miles 6 960 Ships in 18 - 22 working days
Seven Deadliest Social Network Attacks (Paperback): Carl Timm, Richard Perez Seven Deadliest Social Network Attacks (Paperback)
Carl Timm, Richard Perez
R831 Discovery Miles 8 310 Ships in 18 - 22 working days

Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered with social networking tools and devices. These are: social networking infrastructure attacks; malware attacks; phishing attacks; Evil Twin Attacks; identity theft; cyberbullying; and physical threat. Each chapter takes readers through a detailed overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. In addition to analyzing the anatomy of the attacks, the book offers insights into how to develop mitigation strategies, including forecasts of where these types of attacks are heading. This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals at all levels, those in the teaching profession, and recreational hackers.

Encyclopedia of Cybercrime (Paperback): Samuel C. McQuade Encyclopedia of Cybercrime (Paperback)
Samuel C. McQuade
R1,462 Discovery Miles 14 620 Ships in 18 - 22 working days

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and telecommunications technologies have increasingly threatened societies as they have become reliant on information systems for sustaining modernized living. Cybercrime is not a new phenomenon, rather an evolving one with respect to adoption of information technology (IT) for abusive and criminal purposes. Further, by virtue of the myriad ways in which IT is abused, it represents a technological shift in the nature of crime rather than a new form of criminal behavior. In other words, the nature of crime and its impacts on society are changing to the extent computers and other forms of IT are used for illicit purposes. Understanding the subject, then, is imperative to combatting it and to addressing it at various levels. This work is the first comprehensive encyclopedia to address cybercrime. Topical articles address all key areas of concern and specifically those having to with: terminology, definitions and social constructs of crime; national infrastructure security vulnerabilities and capabilities; types of attacks to computers and information systems; computer abusers and cybercriminals; criminological, sociological, psychological and technological theoretical underpinnings of cybercrime; social and economic impacts of crime enabled with information technology (IT) inclusive of harms experienced by victims of cybercrimes and computer abuse; emerging and controversial issues such as online pornography, the computer hacking subculture and potential negative effects of electronic gaming and so-called computer addiction; bodies and specific examples of U.S. federal laws and regulations that help to prevent cybercrimes; examples and perspectives of law enforcement, regulatory and professional member associations concerned about cybercrime and its impacts; and computer forensics as well as general investigation/prosecution of high tech crimes and attendant challenges within the United States and internationally.

Hacking - Digital Media and Technological Determinism (Paperback): T. Jordan Hacking - Digital Media and Technological Determinism (Paperback)
T. Jordan
R583 Discovery Miles 5 830 Ships in 18 - 22 working days

Hacking provides an introduction to the community of hackers and an analysis of the meaning of hacking in twenty-first century societies.
One the one hand, hackers infect the computers of the world, entering where they are not invited, taking over not just individual workstations but whole networks. On the other, hackers write the software that fuels the Internet, from the most popular web programmes to software fundamental to the Internet's existence. Beginning from an analysis of these two main types of hackers, categorised as crackers and Free Software/Open Source respectively, Tim Jordan gives the reader insight into the varied identities of hackers, including:
* Hacktivism; hackers and populist politics
* Cyberwar; hackers and the nation-state
* Digital Proletariat; hacking for the man
* Viruses; virtual life on the Internet
* Digital Commons; hacking without software
* Cypherpunks; encryption and digital security
* Nerds and Geeks; hacking cultures or hacking without the hack
* Cybercrime; blackest of black hat hacking
Hackers end debates over the meaning of technological determinism while recognising that at any one moment we are all always determined by technology. Hackers work constantly within determinations of their actions created by technologies as they also alter software to enable entirely new possibilities for and limits to action in the virtual world. Through this fascinating introduction to the people who create and recreate the digital media of the Internet, students, scholars and general readers will gain new insight into the meaning of technology and society when digital media are hacked.

IIS Security (Paperback): Marty Jost IIS Security (Paperback)
Marty Jost
R1,406 R1,179 Discovery Miles 11 790 Save R227 (16%) Ships in 18 - 22 working days

Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restrictive techniques to protect against attacks and other security violations.

Hacking Exposed  - J2EE & Java (Paperback): Art Taylor, Brian Buege, Randy Layman Hacking Exposed - J2EE & Java (Paperback)
Art Taylor, Brian Buege, Randy Layman
R1,374 R1,147 Discovery Miles 11 470 Save R227 (17%) Ships in 18 - 22 working days

Secure your Java and J2EE applications--from the hacker's perspective

Application security is a highly complex topic with new vulnerabilities surfacing every day. Break-ins, fraud, sabotage, and DoS attacks are on the rise, and quickly evolving Java-based technology makes safeguarding enterprise applications more challenging than ever. Hacking Exposed J2EE & Java will show you, step-by-step, how to defend against the latest attacks by understanding the hacker's methods and thought processes. You'll gain insight through examples of real-world attacks, both ordinary and sophisticated, and get valuable countermeasures to protect against them. You'll also find an in-depth case study with Java and J2EE security examples and "actual working code incorporated throughout the book.

What you'll learn: The proven Hacking Exposed methodology to locate and patch vulnerable systems How to apply effective security countermeasures to applications which use the following Java enterprise technologies: Servlets and Java Server Pages (JSPs); Enterprise Java Beans (EJBs); Web Services; Applets; Java Web Start; Remote Method Invocation (RMI); Java Message Service (JMS) How to design a security strategy that extends throughout a multi-tiered J2EE architecture using J2SE 1.4 and J2EE 1.3 What common, but devastating, vulnerabilities exist within many J2EE applications How to use the J2EE security architecture to create secure J2EE applications How to use the Java security APIs, including the Java Authentication and Authorization Service (JAAS), the Java Cryptography Extension (JCE), and the Java Secure Socket Extension (JSSE) How to create applications that proactively defend against malicious users,content manipulation, and other attacks. Valuable tips for hardening J2EE applications based on the authors' expertise

The Browser Hacker's Handbook (Paperback): W Alcorn The Browser Hacker's Handbook (Paperback)
W Alcorn 1
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: * Bypassing the Same Origin Policy * ARP spoofing, social engineering, and phishing to access browsers * DNS tunneling, attacking web applications, and proxying all from the browser * Exploiting the browser and its ecosystem (plugins and extensions) * Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

Hacker's Challenge (Paperback): Mike Schiffman Hacker's Challenge (Paperback)
Mike Schiffman
R888 R782 Discovery Miles 7 820 Save R106 (12%) Ships in 18 - 22 working days

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed): Charles C Mann, David H. Freedman At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed)
Charles C Mann, David H. Freedman
R494 Discovery Miles 4 940 Ships in 18 - 22 working days

Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.

At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback): Gail Grant Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback)
Gail Grant
R945 R813 Discovery Miles 8 130 Save R132 (14%) Ships in 18 - 22 working days

This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.

The Watchman: the Twisted Life and Crimes of Serial Hacker Kevin Poulsen (Hardcover, 1st ed): Jonathan Littman The Watchman: the Twisted Life and Crimes of Serial Hacker Kevin Poulsen (Hardcover, 1st ed)
Jonathan Littman
R842 R777 Discovery Miles 7 770 Save R65 (8%) Ships in 18 - 22 working days

Written like a California noir thriller by way of William Gibson, The Watchman brings to life the wildest, most audacious crime spree in the history of cyberspace. Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.

Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed): Michele Slatalla Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed)
Michele Slatalla
R434 Discovery Miles 4 340 Ships in 18 - 22 working days

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Internet Fraud Casebook - The World Wide Web of Deceit (Hardcover): JT Wells Internet Fraud Casebook - The World Wide Web of Deceit (Hardcover)
JT Wells
R1,961 Discovery Miles 19 610 Ships in 18 - 22 working days

Real case studies on Internet fraud written by real fraud examiners

"Internet Fraud Casebook: The World Wide Web of Deceit" is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world.Each case outlines how the fraud was engineered, how it was investigated, and how perpetrators were brought to justiceTopics included are phishing, on-line auction fraud, security breaches, counterfeiting, and othersOther titles by Wells: "Fraud Casebook, Principles of Fraud Examination, " and "Computer Fraud Casebook"

This book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place.

The Car Hacker's Handbook (Paperback): Craig Smith The Car Hacker's Handbook (Paperback)
Craig Smith
R1,281 R1,043 Discovery Miles 10 430 Save R238 (19%) Ships in 10 - 15 working days

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven t kept pace with today s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle s communication network, you ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker s Handbook will show you how to: Build an accurate threat model for

IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,434 Discovery Miles 24 340 Ships in 18 - 22 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Network Forensics - Tracking Hackers through Cyberspace (Hardcover): Sherri Davidoff, Jonathan Ham Network Forensics - Tracking Hackers through Cyberspace (Hardcover)
Sherri Davidoff, Jonathan Ham
R1,821 Discovery Miles 18 210 Ships in 18 - 22 working days

""This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.""- Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. ""It's like a symphony meeting an encyclopedia meeting a spy novel.""-Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in "Network Forensics: Tracking Hackers through Cyberspace."Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up "Network Forensics"and find out.

Terrorism and Counterterrorism - International Student Edition (Paperback, 7th edition): Brigitte L. Nacos Terrorism and Counterterrorism - International Student Edition (Paperback, 7th edition)
Brigitte L. Nacos
R2,596 Discovery Miles 25 960 Ships in 18 - 22 working days

Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context. In this comprehensive and highly readable text, renowned expert Brigitte Nacos clearly defines terrorism’s diverse causes, actors, and strategies; outlines anti- and counterterrorist responses; and highlights terrorism’s relationship with the public and media. Terrorism and Counterterrorism introduces students to the field’s main debates and helps them critically assess our understanding of, and our strategies for, addressing this complex and enduring issue. New to the Seventh Edition: The new chapter 3 reviews the history of terrorism—both domestic and international, whereas the new chapter 4 analyses the terrorist landscape in the third decade of the 21st century—including the transnational links between violent far-right and far-left violent extremists. The discussion of religious terrorism in chapter 5 ends with an added section about QAnon as religiopolitical cult. An extended section in chapter 7 is devoted to the increasingly militant roles of females in violent far-right extremism. The revised chapter 10 starts with the withdrawal of U.S.-led troops from Afghanistan and an account of total costs spent on the post-9/11 war against terrorism before discussing the counterterrorism strategies of presidents G.W. Bush, Obama, Trump, and Biden. The failures and successes of the U.S. intelligence community in efforts to prevent terrorism at home with relevant data and case studies are new features in chapter 12.

Terrorism and Counterterrorism - International Student Edition (Hardcover, 7th edition): Brigitte L. Nacos Terrorism and Counterterrorism - International Student Edition (Hardcover, 7th edition)
Brigitte L. Nacos
R5,634 Discovery Miles 56 340 Ships in 18 - 22 working days

Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context. In this comprehensive and highly readable text, renowned expert Brigitte Nacos clearly defines terrorism's diverse causes, actors, and strategies; outlines anti- and counterterrorist responses; and highlights terrorism's relationship with the public and media. Terrorism and Counterterrorism introduces students to the field's main debates and helps them critically assess our understanding of, and our strategies for, addressing this complex and enduring issue. New to the Seventh Edition: The new chapter 3 reviews the history of terrorism-both domestic and international, whereas the new chapter 4 analyses the terrorist landscape in the third decade of the 21st century-including the transnational links between violent far-right and far-left violent extremists. The discussion of religious terrorism in chapter 5 ends with an added section about QAnon as religiopolitical cult. An extended section in chapter 7 is devoted to the increasingly militant roles of females in violent far-right extremism. The revised chapter 10 starts with the withdrawal of U.S.-led troops from Afghanistan and an account of total costs spent on the post-9/11 war against terrorism before discussing the counterterrorism strategies of presidents G.W. Bush, Obama, Trump, and Biden. The failures and successes of the U.S. intelligence community in efforts to prevent terrorism at home with relevant data and case studies are new features in chapter 12.

Cybercrime - Key Issues and Debates (Paperback, 2nd edition): Alisdair A. Gillespie Cybercrime - Key Issues and Debates (Paperback, 2nd edition)
Alisdair A. Gillespie
R1,694 Discovery Miles 16 940 Ships in 10 - 15 working days

Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions (Paperback, Ed): Clint Bodungen, Bryan... Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions (Paperback, Ed)
Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
R1,583 R1,296 Discovery Miles 12 960 Save R287 (18%) Ships in 18 - 22 working days

Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the battle-tested Hacking Exposed style, the book arms you with the skills and tools necessary to defend against attacks that are debilitating-and potentially deadly. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions explains vulnerabilities and attack vectors specific to ICS/SCADA protocols, applications, hardware, servers, and workstations. You will learn how hackers and malware, such as the infamous Stuxnet worm, can exploit them and disrupt critical processes, compromise safety, and bring production to a halt. The authors fully explain defense strategies and offer ready-to-deploy countermeasures. Each chapter features a real-world case study as well as notes, tips, and cautions. Features examples, code samples, and screenshots of ICS/SCADA-specific attacks Offers step-by-step vulnerability assessment and penetration test instruction Written by a team of ICS/SCADA security experts and edited by Hacking Exposed veteran Joel Scambray

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Understanding the basic conditions of…
Chanda Chungu, Evance Kalula Paperback R346 Discovery Miles 3 460
Dismissal
John Grogan Paperback R1,319 R1,136 Discovery Miles 11 360
A Deep Dive into NoSQL Databases: The…
Pethuru Raj, Ganesh Chandra Deka Hardcover R4,219 Discovery Miles 42 190
Structured Electronic Design…
Chris J.M. Verhoeven, Arie van Staveren, … Hardcover R3,987 Discovery Miles 39 870
Employers guide to the employment equity…
Simona Tinarelli Book R723 Discovery Miles 7 230
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, … Paperback R1,109 R1,049 Discovery Miles 10 490
Labour Law In Context
D. Abrahams, K. Calitz, … Paperback R836 Discovery Miles 8 360
Engineering Methods in the…
Jolita Ralyte, Isabelle Mirbel, … Hardcover R1,422 Discovery Miles 14 220
Effective Workplace Solutions…
Paperback R433 Discovery Miles 4 330
Dissecting and Dismantling Occupational…
Adnan ul Haque Hardcover R7,756 Discovery Miles 77 560

 

Partners