0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (27)
  • R500+ (301)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Terrorism and Counterterrorism - International Student Edition (Hardcover, 7th edition): Brigitte L. Nacos Terrorism and Counterterrorism - International Student Edition (Hardcover, 7th edition)
Brigitte L. Nacos
R5,181 Discovery Miles 51 810 Ships in 18 - 22 working days

Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context. In this comprehensive and highly readable text, renowned expert Brigitte Nacos clearly defines terrorism's diverse causes, actors, and strategies; outlines anti- and counterterrorist responses; and highlights terrorism's relationship with the public and media. Terrorism and Counterterrorism introduces students to the field's main debates and helps them critically assess our understanding of, and our strategies for, addressing this complex and enduring issue. New to the Seventh Edition: The new chapter 3 reviews the history of terrorism-both domestic and international, whereas the new chapter 4 analyses the terrorist landscape in the third decade of the 21st century-including the transnational links between violent far-right and far-left violent extremists. The discussion of religious terrorism in chapter 5 ends with an added section about QAnon as religiopolitical cult. An extended section in chapter 7 is devoted to the increasingly militant roles of females in violent far-right extremism. The revised chapter 10 starts with the withdrawal of U.S.-led troops from Afghanistan and an account of total costs spent on the post-9/11 war against terrorism before discussing the counterterrorism strategies of presidents G.W. Bush, Obama, Trump, and Biden. The failures and successes of the U.S. intelligence community in efforts to prevent terrorism at home with relevant data and case studies are new features in chapter 12.

Cybercrime - Key Issues and Debates (Paperback, 2nd edition): Alisdair A. Gillespie Cybercrime - Key Issues and Debates (Paperback, 2nd edition)
Alisdair A. Gillespie
R1,694 Discovery Miles 16 940 Ships in 10 - 15 working days

Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.

Introduction to Cybercrime - Computer Crimes, Laws, and Policing in the 21st Century (Paperback): Joshua B. Hill, Nancy E.... Introduction to Cybercrime - Computer Crimes, Laws, and Policing in the 21st Century (Paperback)
Joshua B. Hill, Nancy E. Marion
R1,496 Discovery Miles 14 960 Ships in 18 - 22 working days

Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local. As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity-from copyright infringement to phishing to online pornography-has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts-if any-could deter cybercrime in the highly networked and extremely fast-moving modern world? Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century seeks to address this tough question and enables readers to better contextualize the place of cybercrime in the current landscape. This textbook documents how a significant side effect of the positive growth of technology has been a proliferation of computer-facilitated crime, explaining how computers have become the preferred tools used to commit crimes, both domestically and internationally, and have the potential to seriously harm people and property alike. The chapters discuss different types of cybercrimes-including new offenses unique to the Internet-and their widespread impacts. Readers will learn about the governmental responses worldwide that attempt to alleviate or prevent cybercrimes and gain a solid understanding of the issues surrounding cybercrime in today's society as well as the long- and short-term impacts of cybercrime. Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics Supplies examinations of both the domestic and international efforts to combat cybercrime Serves an ideal text for first-year undergraduate students in criminal justice programs

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Paperback, 2nd edition): Mark... Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Paperback, 2nd edition)
Mark Collier, David Endler
R1,401 R1,174 Discovery Miles 11 740 Save R227 (16%) Ships in 18 - 22 working days

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, "Hacking Exposed: Voice over IP Secrets & Solutions," provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers." --Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

"Powerful UC hacking secrets revealed within. An outstanding and informative book. "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security." --Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

"After reading "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold." --J. Oquendo, Lead Security Engineer, E-Fensive Security Strategies

""Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece." --Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

"This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them." --Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. "Hacking Exposed Unified Communications & VoIP," Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

Hacking Exposed Mobile (Paperback, Ed): Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil... Hacking Exposed Mobile (Paperback, Ed)
Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, …
R1,329 R1,102 Discovery Miles 11 020 Save R227 (17%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Proven security tactics for today's mobile apps,devices, and networks"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depthunderstanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling toiOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists

Cyber Crime & Warfare: All That Matters (Paperback): Peter Warren, Michael Streeter Cyber Crime & Warfare: All That Matters (Paperback)
Peter Warren, Michael Streeter
R548 Discovery Miles 5 480 Ships in 18 - 22 working days

Take a fascinating and provocative look at cyber crime and warfare

In "Cyber Crime & Warfare: All That Matters," Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage, and cyber warfare now pose a major threat to society. The authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect at a time when the modern world--including all the communication services and utilities we have come to take for granted--has become utterly dependent on computers and the internet.

Inside you will find: A 100 Ideas section that offers original and inspirational ideas to help readers explore the subject in more depth Weblinks and QR codes throughout the text, linking to videos from the author, or more detailed audio explanations Helpful text boxes around key concepts that make navigating through the material a snap

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
This Is How They Tell Me the World Ends…
Nicole Perlroth Paperback R324 R297 Discovery Miles 2 970
Cybersecurity - What You Need to Know…
Lester Evans Hardcover R690 R619 Discovery Miles 6 190
Computer and Intrusion Forensics
George Mohay, Alison Anderson, … Hardcover R2,583 Discovery Miles 25 830
Cybersecurity Ethics - An Introduction
Mary Manjikian Hardcover R3,728 Discovery Miles 37 280
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,233 Discovery Miles 22 330
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda Paperback R1,208 Discovery Miles 12 080
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R474 Discovery Miles 4 740
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
Introduction to Cybercrime - Computer…
Joshua B. Hill, Nancy E. Marion Hardcover R2,521 R2,383 Discovery Miles 23 830

 

Partners