![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Take a fascinating and provocative look at cyber crime and warfare In "Cyber Crime & Warfare: All That Matters," Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage, and cyber warfare now pose a major threat to society. The authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect at a time when the modern world--including all the communication services and utilities we have come to take for granted--has become utterly dependent on computers and the internet. Inside you will find: A 100 Ideas section that offers original and inspirational ideas to help readers explore the subject in more depth Weblinks and QR codes throughout the text, linking to videos from the author, or more detailed audio explanations Helpful text boxes around key concepts that make navigating through the material a snap
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself |
You may like...
Intelligent Integrated Energy Systems…
Peter Palensky, Milos Cvetkovic, …
Hardcover
R2,668
Discovery Miles 26 680
Robotic Vision - Technologies for…
Jose Garcia Rodriguez, Miguel A Cazorla Quevedo
Hardcover
R5,016
Discovery Miles 50 160
Robotics Research - The 15th…
Henrik I. Christensen, Oussama Khatib
Hardcover
R2,835
Discovery Miles 28 350
Cells and Robots - Modeling and Control…
Dejan Lj Milutinovic, Pedro U. Lima
Hardcover
R2,642
Discovery Miles 26 420
Applied Artificial Intelligence - A…
Swati V. Shinde, Varsha Bendre, …
Hardcover
R3,652
Discovery Miles 36 520
Glowworm Swarm Optimization - Theory…
Krishnanand N. Kaipa, Debasish Ghose
Hardcover
Statistical Applications from Clinical…
Jianchang Lin, Bushi Wang, …
Hardcover
R5,901
Discovery Miles 59 010
Concept Parsing Algorithms (CPA) for…
Uri Shafrir, Masha Etkind
Hardcover
R3,276
Discovery Miles 32 760
Progress in Turbulence VII - Proceedings…
Ramis Oerlu, Alessandro Talamelli, …
Hardcover
|