0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (31)
  • R500+ (313)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Hackers: Heroes of the Computer Revolution (Paperback, 25th Anniversary ed): Steven Levy Hackers: Heroes of the Computer Revolution (Paperback, 25th Anniversary ed)
Steven Levy
R778 R656 Discovery Miles 6 560 Save R122 (16%) Ships in 10 - 15 working days

Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly. Hackers traces the exploits of innovators from the research labs in the late 1950s to the rise of the home computer in the mid-1980s. It's a fascinating story of brilliant and eccentric nerds such as Steve Wozniak, Ken Williams, and John Draper who took risks, bent the rules, and took the world in a radical new direction. "Hacker" is often a derogatory term today, but 40 years ago, it referred to people who found clever and unorthodox solutions to computer engineering problems -- a practice that became known as "the hacker ethic." In this book, Levy takes you from the true hackers of MIT's Tech Model Railroad Club to the DIY culture that spawned the first personal computers -- the Altair and the Apple II -- and finally to the gaming culture of the early '80s. From students finagling access to clunky computer-card machines to engineers uncovering the secrets of what would become the Internet, Hackers captures a seminal period in history when underground activities blazed a trail for today's digital world. This book is not just for geeks -- it's for everyone interested in origins of the computer revolution.

Intercept - The Secret History of Computers and Spies (Paperback): Gordon Corera Intercept - The Secret History of Computers and Spies (Paperback)
Gordon Corera 1
R457 R415 Discovery Miles 4 150 Save R42 (9%) Ships in 9 - 17 working days

The computer was born to spy, and now computers are transforming espionage. But who are the spies and who is being spied on in today's interconnected world? This is the exhilarating secret history of the melding of technology and espionage. Gordon Corera's compelling narrative, rich with historical details and characters, takes us from the Second World War to the internet age, revealing the astonishing extent of cyberespionage carried out today. Drawing on unique access to intelligence agencies, heads of state, hackers and spies of all stripes, INTERCEPT is a ground-breaking exploration of the new space in which the worlds of espionage, geopolitics, diplomacy, international business, science and technology collide. Together, computers and spies are shaping the future. What was once the preserve of a few intelligence agencies now matters for us all.

Bit By Bit (Large print, Hardcover, Large type / large print edition): Hanley Bit By Bit (Large print, Hardcover, Large type / large print edition)
Hanley; Edited by Christine A. Adams
R796 R755 Discovery Miles 7 550 Save R41 (5%) Ships in 9 - 17 working days
Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition... Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition (Paperback, 3rd Revised edition)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari
R1,443 Discovery Miles 14 430 Ships in 10 - 15 working days

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Key Features Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Book DescriptionWeb Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. What you will learn Learn how to set up your lab with Kali Linux Understand the core concepts of web penetration testing Get to know the tools and techniques you need to use with Kali Linux Identify the difference between hacking a web application and network hacking Expose vulnerabilities present in web servers and their applications using server-side attacks Understand the different techniques used to identify the flavor of web applications See standard attacks such as exploiting cross-site request forgery and cross-site scripting flaws Get an overview of the art of client-side attacks Explore automated attacks such as fuzzing web applications Who this book is forSince this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must.

How to Keep Your Stuff Safe Online (Paperback): Raef Meeuwisse How to Keep Your Stuff Safe Online (Paperback)
Raef Meeuwisse
R207 Discovery Miles 2 070 Ships in 10 - 15 working days
Game Hacking (Paperback): Nick Cano Game Hacking (Paperback)
Nick Cano
R1,139 R1,044 Discovery Miles 10 440 Save R95 (8%) Ships in 12 - 19 working days

You don t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of Windows-based development and memory management, and Game Hacking will teach you what you need to become a true game hacker. Learn the basics, like reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection, and hone your new skills with hands-on example code and practice binaries. Level up as you learn how to: Scan and modify memory with Cheat Engine Explore program structure and execution flow with OllyDbg Log processes and pinpoint useful data files with Process Monitor Manipulate control flow through NOPing, hooking, and more Locate and dissect common game memory structures You ll even discover the secrets behind common game bots, including: Extrasensory perception hacks, such as wallhac

Cybersecurity Exposed: The Cyber House Rules (Paperback): Raef Meeuwisse Cybersecurity Exposed: The Cyber House Rules (Paperback)
Raef Meeuwisse
R443 Discovery Miles 4 430 Ships in 9 - 17 working days
Binary Bullets - The Ethics of Cyberwarfare (Paperback): Fritz Allhoff, Adam Henschke, Bradley Jay Strawser Binary Bullets - The Ethics of Cyberwarfare (Paperback)
Fritz Allhoff, Adam Henschke, Bradley Jay Strawser
R1,314 Discovery Miles 13 140 Ships in 12 - 19 working days

Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain " of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.

Introduction to Cybercrime - Computer Crimes, Laws, and Policing in the 21st Century (Paperback): Joshua B. Hill, Nancy E.... Introduction to Cybercrime - Computer Crimes, Laws, and Policing in the 21st Century (Paperback)
Joshua B. Hill, Nancy E. Marion
R1,618 Discovery Miles 16 180 Ships in 10 - 15 working days

Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local. As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity-from copyright infringement to phishing to online pornography-has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts-if any-could deter cybercrime in the highly networked and extremely fast-moving modern world? Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century seeks to address this tough question and enables readers to better contextualize the place of cybercrime in the current landscape. This textbook documents how a significant side effect of the positive growth of technology has been a proliferation of computer-facilitated crime, explaining how computers have become the preferred tools used to commit crimes, both domestically and internationally, and have the potential to seriously harm people and property alike. The chapters discuss different types of cybercrimes-including new offenses unique to the Internet-and their widespread impacts. Readers will learn about the governmental responses worldwide that attempt to alleviate or prevent cybercrimes and gain a solid understanding of the issues surrounding cybercrime in today's society as well as the long- and short-term impacts of cybercrime. Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics Supplies examinations of both the domestic and international efforts to combat cybercrime Serves an ideal text for first-year undergraduate students in criminal justice programs

Beyond Contempt - The Inside Story of the Phone Hacking Trial (Paperback): Peter Jukes Beyond Contempt - The Inside Story of the Phone Hacking Trial (Paperback)
Peter Jukes; Cover design or artwork by Martin Rowson
R640 Discovery Miles 6 400 Ships in 10 - 15 working days

'A must read for anyone who wants to understand not only our media, but power in Britain' - OWEN JONES, author The Establishment 'Top court reporting' - NICK DAVIES, THE GUARDIAN Go behind the doors of Court 12 of the Old Bailey for what was billed as 'the trial of the century' - the phone hacking trial of journalists from Rupert Murdoch's two biggest British tabloid newspapers. Every twist and turn of the longest-running criminal trial in English legal history is covered by Peter Jukes in this edition, crowdfunded by members of the public. Heard in London in 2013 and 2014, the phone hacking trial had a heady brew of criminal eavesdropping, media rights, political intrigue, and Hollywood stardust. Rebekah Brooks and Andy Coulson were accused of phone hacking and corrupting public officials while editing the Sun and the News of the World newspapers respectively. Brooks and her husband Charlie and her former PA, Cheryl Carter, were also accused of perverting the course of justice in an attempt to thwart detectives investigating the hacking. The trial took place after years of cover up of phone hacking at Britain's biggest newspaper group News International (now News UK), the country's biggest police force, the Metropolitan Police, and the Conservative government led by David Cameron, who employed Coulson as his director of communications. After they were sworn in, the judge, Justice Saunders, told the jury: "British justice is on trial". The long-running trial laid bare the intense illegal surveillance of individuals carried out by the politically-connected News of the World. Employing an array of private detectives, pried deeply into the private lives of anyone who mattered to them at the time: a Hollywood actress, a missing schoolgirl, a Cabinet minister. Sometimes the surveillance was based on well-founded intelligence that revealed a legitimate story, sometimes it was on a whim or the result of a malicious tip-off. The trial pitted London's most extravagantly paid barristers against each other. Rupert Murdoch's millions hired top Queens Counsel to represent the seven defendants. The GBP5,000-a-day barrister, Jonathan Laidlaw, for instance, represented Rebekah Brooks. The multi-million pound case tottered on the brink of collapse several times as a result media misbehaviour, illness and delay. Drawing on verbatim court exchanges and exhibits, Jukes reveals the daily reality and grand strategies of this major criminal case. He reveals a secret about Rebekah Brooks' 14 days in the witness box. He explains why a defence lawyer gave him a wry smile during a cigarette break. And he discloses the failings of the Crown Prosecution Service which contribute to the verdicts. Like Dial M for Murdoch by Tom Watson and Martin Hickman and Hack Attack by Nick Davies, this book will fascinate anyone wanting to know about the phone hacking scandal. It is also ideal for anyone who wants to know the twists and turns of a major criminal trial. REVIEWS 'Remarkable. I feel I now know all the key players and why some defendants were found guilty and some not, despite never having spent a minute at the trial.' - PROFESSOR STEWART PURVIS, FORMER ITN EDITOR 'Written in a chatty, gossipy style that brings the courtroom drama alive.' - NIGEL PAULEY, DAILY STAR JOURNALIST

E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback): Les Hatton E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback)
Les Hatton
R1,009 Discovery Miles 10 090 Ships in 10 - 15 working days

This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention.

The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the number of successful attacks is increasing.

The seeds of this book were sown three years ago when the author, a Professor of Forensic Software Engineering, was trying to recover his 20 year-old e-mail address from the clutches of spammers who had rendered it almost unusable with more than 140,000 junk messages a day. It got to the point where he was invited by his ISP to either change it or take it elsewhere. Instead he decided to find out how to prevent the deluge, acquired his own servers and began researching.

The book is a mixture of analysis, experiment and implementation in almost equal proportions with detailed description of the defence in depth necessary to turn the tidal wave of junk aside leaving only what the end user wants to see - no more and no less. It covers: -

  • 1. The rise of e-mail
  • 2. How it all works
  • 3. Scams, spam and other abuse
  • 4. Protection: the principles of filtering
  • 5. Going deeper: setting up a mail server
  • 6. Advanced content filtering
  • 7. The bottom line - how well can we do ?
  • 8. Where is all this going ?
There is something here for everyone. Chapters 1-4 are suitable for the general reader who just wants to understand how spammers and scammers work and find out a little more about the many forms of attack. Chapters 5 and 6 are highly technical and suitable for both e-mail administrators and theoreticians and include a discussion of the latest computational and mathematical techniques for detecting textual patterns. Chapter 7 presents the results of applying the techniques in this book on the several million junk messages the author's servers received over a 10 month period. Chapter 8 tries to see into the future a little to predict how the arms race between the attackers and defenders might go. Finally, those interested in governance will find discussions of the dangers of release of e-mail addresses under Freedom of Information Requests.

The book contains many illustrations of attacks and is supported by numerous code examples in Perl and C.

Perfection is impossible, but if you follow the advice in this book, you can build mail systems which provably make no more than 5 mistakes per million messages received, very close to the definitive manufacturing standard of six sigma. The threat from viruses effectively disappears and the e-mail user is secured from toxic content.

Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition): Mike Shema Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition)
Mike Shema
R1,411 R1,190 Discovery Miles 11 900 Save R221 (16%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend against today's most devious attacksFully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustratedby code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback): Thomas J.... Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback)
Thomas J. Holt
R5,086 Discovery Miles 50 860 Ships in 10 - 15 working days

Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and those victimized by it. The anthology "Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment" explores the predictors for participation in various forms of cybercrime and deviance, from common problems like media piracy, to more distinct offenses such as computer hacking. Most criminological theories were developed to account for street crimes, so it is unclear how these theories may apply to virtual offending. This text provides critical insight into the utility of multiple theories to account for cybercrimes.
"Cybercrime and Criminological Theory" gives direct insight into the rates and prevalence of cybercrime offenses using data sets from populations across the United States. It gives readers a fundamental understanding of, and appreciation for various forms of cybercrime, and outlines prospective predictors of both offending and victimization. The selected readings identify research questions that must be addressed in order to improve the legal, technical, and policy responses to cybercrimes.
"Cybercrime and Criminological Theory" begins with an introduction to cybercrime and virtual criminality. From there, the book offers five sections featuring seminal and cutting edge works on topics in:
- Routine Activities Theory
- Deterrence Theory
- Social Learning and Self Control
- General Strain Theory
- Deviant Subcultures
The book uses articles and cutting-edge research in the field to create a text that is relevant for students at all levels of study, as well as scholars in criminology, sociology, and information security. Undergraduate students will gain insight into the value of various theories to account for victimization and offending, and learn basic research methods applied by criminologists to assess crime and victimization. Graduate students benefit from the detail provided on research methods, measurement, and research questions that must be addressed to fully understand cybercrimes.
Thomas J. Holt earned his Ph.D. at the University of Missouri, Saint Louis. He is currently an Associate Professor in the School of Criminal Justice at Michigan State University. His areas of research include computer hacking, malware, and the role played by technology and computer-mediated communications in facilitating crime and deviance. Dr. Holt is the co-author of "Digital Crime and Digital Terror," and the co-editor of "Corporate Hacking and Technology-Driven Crime." He is also the editor of the book "Cybercrime: Causes, Correlates, and Context." His work has also been published in numerous academic journals, including "Crime and Delinquency," "Deviant Behavior," and the "Journal of Criminal Justice." Dr. Holt received two grants from the U.S. National Institute of Justice to examine the market for malicious software, and the social dynamics of carders and on-line data thieves. Additionally, he is the project lead for the Spartan Devils Chapter of the Honeynet Project, and directs the MSU Open Source Research Laboratory, which explores cyber threats around the globe through on-line research.

A Bug Hunter's Diary (Paperback): Tobias Klein A Bug Hunter's Diary (Paperback)
Tobias Klein
R1,183 Discovery Miles 11 830 Ships in 10 - 15 working days

"This is one of the most interesting infosec books to come out in the last several years."-Dino Dai Zovi, Information Security Professional

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."-Felix 'FX' Lindner

Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.

"A Bug Hunter's Diary" follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs--or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.

Along the way you'll learn how to: Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokers

"A Bug Hunter's Diary" is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

Kingpin - The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network (Paperback): Kevin... Kingpin - The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network (Paperback)
Kevin Poulsen
R749 Discovery Miles 7 490 Ships in 10 - 15 working days
China's Cyberwarfare Capability (Paperback, New): Elisabette M. Marvel China's Cyberwarfare Capability (Paperback, New)
Elisabette M. Marvel
R1,366 R1,041 Discovery Miles 10 410 Save R325 (24%) Ships in 12 - 19 working days

The government of the People's Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.

Seven Deadliest Social Network Attacks (Paperback): Carl Timm, Richard Perez Seven Deadliest Social Network Attacks (Paperback)
Carl Timm, Richard Perez
R895 Discovery Miles 8 950 Ships in 10 - 15 working days

Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered with social networking tools and devices. These are: social networking infrastructure attacks; malware attacks; phishing attacks; Evil Twin Attacks; identity theft; cyberbullying; and physical threat. Each chapter takes readers through a detailed overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. In addition to analyzing the anatomy of the attacks, the book offers insights into how to develop mitigation strategies, including forecasts of where these types of attacks are heading. This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals at all levels, those in the teaching profession, and recreational hackers.

Encyclopedia of Cybercrime (Paperback): Samuel C. McQuade Encyclopedia of Cybercrime (Paperback)
Samuel C. McQuade
R1,527 Discovery Miles 15 270 Ships in 10 - 15 working days

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and telecommunications technologies have increasingly threatened societies as they have become reliant on information systems for sustaining modernized living. Cybercrime is not a new phenomenon, rather an evolving one with respect to adoption of information technology (IT) for abusive and criminal purposes. Further, by virtue of the myriad ways in which IT is abused, it represents a technological shift in the nature of crime rather than a new form of criminal behavior. In other words, the nature of crime and its impacts on society are changing to the extent computers and other forms of IT are used for illicit purposes. Understanding the subject, then, is imperative to combatting it and to addressing it at various levels. This work is the first comprehensive encyclopedia to address cybercrime. Topical articles address all key areas of concern and specifically those having to with: terminology, definitions and social constructs of crime; national infrastructure security vulnerabilities and capabilities; types of attacks to computers and information systems; computer abusers and cybercriminals; criminological, sociological, psychological and technological theoretical underpinnings of cybercrime; social and economic impacts of crime enabled with information technology (IT) inclusive of harms experienced by victims of cybercrimes and computer abuse; emerging and controversial issues such as online pornography, the computer hacking subculture and potential negative effects of electronic gaming and so-called computer addiction; bodies and specific examples of U.S. federal laws and regulations that help to prevent cybercrimes; examples and perspectives of law enforcement, regulatory and professional member associations concerned about cybercrime and its impacts; and computer forensics as well as general investigation/prosecution of high tech crimes and attendant challenges within the United States and internationally.

Hacking - Digital Media and Technological Determinism (Paperback): T. Jordan Hacking - Digital Media and Technological Determinism (Paperback)
T. Jordan
R543 Discovery Miles 5 430 Ships in 12 - 19 working days

Hacking provides an introduction to the community of hackers and an analysis of the meaning of hacking in twenty-first century societies.
One the one hand, hackers infect the computers of the world, entering where they are not invited, taking over not just individual workstations but whole networks. On the other, hackers write the software that fuels the Internet, from the most popular web programmes to software fundamental to the Internet's existence. Beginning from an analysis of these two main types of hackers, categorised as crackers and Free Software/Open Source respectively, Tim Jordan gives the reader insight into the varied identities of hackers, including:
* Hacktivism; hackers and populist politics
* Cyberwar; hackers and the nation-state
* Digital Proletariat; hacking for the man
* Viruses; virtual life on the Internet
* Digital Commons; hacking without software
* Cypherpunks; encryption and digital security
* Nerds and Geeks; hacking cultures or hacking without the hack
* Cybercrime; blackest of black hat hacking
Hackers end debates over the meaning of technological determinism while recognising that at any one moment we are all always determined by technology. Hackers work constantly within determinations of their actions created by technologies as they also alter software to enable entirely new possibilities for and limits to action in the virtual world. Through this fascinating introduction to the people who create and recreate the digital media of the Internet, students, scholars and general readers will gain new insight into the meaning of technology and society when digital media are hacked.

The SME Business Guide to Fraud Risk Management (Paperback): Robert James Chapman The SME Business Guide to Fraud Risk Management (Paperback)
Robert James Chapman
R987 R665 Discovery Miles 6 650 Save R322 (33%) Ships in 9 - 17 working days

* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events.

Hacking Exposed  - J2EE & Java (Paperback): Art Taylor, Brian Buege, Randy Layman Hacking Exposed - J2EE & Java (Paperback)
Art Taylor, Brian Buege, Randy Layman
R1,492 R1,239 Discovery Miles 12 390 Save R253 (17%) Ships in 10 - 15 working days

Secure your Java and J2EE applications--from the hacker's perspective

Application security is a highly complex topic with new vulnerabilities surfacing every day. Break-ins, fraud, sabotage, and DoS attacks are on the rise, and quickly evolving Java-based technology makes safeguarding enterprise applications more challenging than ever. Hacking Exposed J2EE & Java will show you, step-by-step, how to defend against the latest attacks by understanding the hacker's methods and thought processes. You'll gain insight through examples of real-world attacks, both ordinary and sophisticated, and get valuable countermeasures to protect against them. You'll also find an in-depth case study with Java and J2EE security examples and "actual working code incorporated throughout the book.

What you'll learn: The proven Hacking Exposed methodology to locate and patch vulnerable systems How to apply effective security countermeasures to applications which use the following Java enterprise technologies: Servlets and Java Server Pages (JSPs); Enterprise Java Beans (EJBs); Web Services; Applets; Java Web Start; Remote Method Invocation (RMI); Java Message Service (JMS) How to design a security strategy that extends throughout a multi-tiered J2EE architecture using J2SE 1.4 and J2EE 1.3 What common, but devastating, vulnerabilities exist within many J2EE applications How to use the J2EE security architecture to create secure J2EE applications How to use the Java security APIs, including the Java Authentication and Authorization Service (JAAS), the Java Cryptography Extension (JCE), and the Java Secure Socket Extension (JSSE) How to create applications that proactively defend against malicious users,content manipulation, and other attacks. Valuable tips for hardening J2EE applications based on the authors' expertise

Hacker's Challenge (Paperback): Mike Schiffman Hacker's Challenge (Paperback)
Mike Schiffman
R964 R842 Discovery Miles 8 420 Save R122 (13%) Ships in 10 - 15 working days

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

IIS Security (Paperback): Marty Jost IIS Security (Paperback)
Marty Jost
R1,526 R1,273 Discovery Miles 12 730 Save R253 (17%) Ships in 10 - 15 working days

Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restrictive techniques to protect against attacks and other security violations.

At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed): Charles C Mann, David H. Freedman At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed)
Charles C Mann, David H. Freedman
R530 Discovery Miles 5 300 Ships in 10 - 15 working days

Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.

At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback): Gail Grant Understanding Digital Signature - Establishing Trust Over the Internet and Other Networks (Paperback)
Gail Grant
R1,026 R876 Discovery Miles 8 760 Save R150 (15%) Ships in 10 - 15 working days

This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
UNIX Internetworking
Uday O Pabrai Hardcover R3,850 Discovery Miles 38 500
Linux Bible, Tenth Edition
C Negus Paperback R1,316 R1,208 Discovery Miles 12 080
Expert Consolidation in Oracle Database…
Martin Bach Paperback R3,204 Discovery Miles 32 040
Linux in Action
David Clinton Paperback R772 R680 Discovery Miles 6 800
Linux Device Drivers
Jonathan Corbet, Alessandro Rubini, … Paperback R1,222 R1,002 Discovery Miles 10 020
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,406 R1,302 Discovery Miles 13 020
Systems Performance
Brendan Gregg Paperback R1,860 R1,458 Discovery Miles 14 580
PeopleSoft for the Oracle DBA
David Kurtz Paperback R1,368 R1,148 Discovery Miles 11 480
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,533 Discovery Miles 15 330
Design and Implementation of the FreeBSD…
Marshall McKusick, George Neville-Neil, … Hardcover R1,937 R1,644 Discovery Miles 16 440

 

Partners