![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever. At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.
This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.
Written like a California noir thriller by way of William Gibson, The Watchman brings to life the wildest, most audacious crime spree in the history of cyberspace. Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause-political or otherwise-which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La premiere moitie du XXIe siecle sera sans doute reconnue comme l'epoque ou le piratage ethique a ouvert de force les gouvernements, deplacant les limites de la transparence. La page twitter de Wikileaks enchasse cet ethos a meme sa devise, " we open governments ", et sa volonte d'etre omnipresent. En parallele, les grandes societes de technologie comme Apple se font competition pour produire des produits de plus en plus securitaires et a proteger les donnees de leurs clients, alors meme que les gouvernements tentent de limiter et de decrypter ces nouvelles technologies d'encryption. Entre-temps, le marche des vulnerabilites en matiere de securite augmente a mesure que les experts en securite informatique vendent des vulnerabilites de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 a 1,5 million de dollars. L'activisme en securite est a la hausse. Le piratage ethique est l'utilisation non-violence d'une technologie quelconque en soutien d'une cause politique ou autre qui est souvent ambigue d'un point de vue juridique et moral. Le hacking ethique peut designer les actes de verification de penetration professionnelle ou d'experts en securite informatique, de meme que d'autres formes d'actions emergentes, comme l'hacktivisme et la desobeissance civile en ligne. L'hacktivisme est une forme de piratage ethique, mais egalement une forme de militantisme des droits civils a l'ere numerique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertes fondamentales, y compris la liberte d'expression et a la vie privee, et la responsabilite des gouvernements d'etre ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antecedents comme les agendas des hacktivistes sont fort diversifies. Il n'est pas clair de quelle facon les tribunaux et les gouvernements traiteront des tentatives de piratage eu egard aux zones grises juridiques, aux approches ethiques conflictuelles, et compte tenu du fait qu'il n'existe actuellement, dans le monde, presque aucune exception aux provisions, en matiere de cybercrime et de crime informatique, liees a la recherche sur la securite ou l'interet public. Il sera egalement difficile de determiner le lien entre hacktivisme et droits civils. Ce livre est publie en anglais.
Real case studies on Internet fraud written by real fraud examiners "Internet Fraud Casebook: The World Wide Web of Deceit" is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world.Each case outlines how the fraud was engineered, how it was investigated, and how perpetrators were brought to justiceTopics included are phishing, on-line auction fraud, security breaches, counterfeiting, and othersOther titles by Wells: "Fraud Casebook, Principles of Fraud Examination, " and "Computer Fraud Casebook" This book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place.
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven t kept pace with today s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle s communication network, you ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker s Handbook will show you how to: Build an accurate threat model for
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout.
The number of security countermeasures against user-land
exploitation is on the rise. Because of this, kernel exploitation
is becoming much more popular among exploit writers and attackers.
Playing with the heart of the operating system can be a dangerous
game: This book covers the theoretical techniques and approaches
needed to develop reliable and effective kernel-level exploits and
applies them to different operating systems (Linux, Solaris, Mac OS
X, and Windows). Kernel exploits require both art and science to
achieve. Every OS has its quirks and so every exploit must be
molded to fully exploit its target. This book discusses the most
popular OS families-UNIX derivatives, Mac OS X, and Windows-and how
to gain complete control over them. Concepts and tactics are
presented categorically so that even when a specifically detailed
exploit has been patched, the foundational information that you
have read will help you to write a newer, better attack or a more
concrete design and defensive structure.
Would you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone - an international corporation or a randomly selected individual. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history and those committed to stopping them. You've never heard of them and you're not getting their real names. Kate Fazzini has met the hackers who create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. Kingdom of Lies is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.
Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context. In this comprehensive and highly readable text, renowned expert Brigitte Nacos clearly defines terrorism’s diverse causes, actors, and strategies; outlines anti- and counterterrorist responses; and highlights terrorism’s relationship with the public and media. Terrorism and Counterterrorism introduces students to the field’s main debates and helps them critically assess our understanding of, and our strategies for, addressing this complex and enduring issue. New to the Seventh Edition: The new chapter 3 reviews the history of terrorism—both domestic and international, whereas the new chapter 4 analyses the terrorist landscape in the third decade of the 21st century—including the transnational links between violent far-right and far-left violent extremists. The discussion of religious terrorism in chapter 5 ends with an added section about QAnon as religiopolitical cult. An extended section in chapter 7 is devoted to the increasingly militant roles of females in violent far-right extremism. The revised chapter 10 starts with the withdrawal of U.S.-led troops from Afghanistan and an account of total costs spent on the post-9/11 war against terrorism before discussing the counterterrorism strategies of presidents G.W. Bush, Obama, Trump, and Biden. The failures and successes of the U.S. intelligence community in efforts to prevent terrorism at home with relevant data and case studies are new features in chapter 12.
Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context. In this comprehensive and highly readable text, renowned expert Brigitte Nacos clearly defines terrorism's diverse causes, actors, and strategies; outlines anti- and counterterrorist responses; and highlights terrorism's relationship with the public and media. Terrorism and Counterterrorism introduces students to the field's main debates and helps them critically assess our understanding of, and our strategies for, addressing this complex and enduring issue. New to the Seventh Edition: The new chapter 3 reviews the history of terrorism-both domestic and international, whereas the new chapter 4 analyses the terrorist landscape in the third decade of the 21st century-including the transnational links between violent far-right and far-left violent extremists. The discussion of religious terrorism in chapter 5 ends with an added section about QAnon as religiopolitical cult. An extended section in chapter 7 is devoted to the increasingly militant roles of females in violent far-right extremism. The revised chapter 10 starts with the withdrawal of U.S.-led troops from Afghanistan and an account of total costs spent on the post-9/11 war against terrorism before discussing the counterterrorism strategies of presidents G.W. Bush, Obama, Trump, and Biden. The failures and successes of the U.S. intelligence community in efforts to prevent terrorism at home with relevant data and case studies are new features in chapter 12.
The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.
The latest techniques for averting UC disaster "This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast "The original edition, "Hacking Exposed: Voice over IP Secrets & Solutions," provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers." --Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious "Powerful UC hacking secrets revealed within. An outstanding and informative book. "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security." --Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class "After reading "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold." --J. Oquendo, Lead Security Engineer, E-Fensive Security Strategies ""Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece." --Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy "This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them." --Shane Green, Senior Voice Security Analyst Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. "Hacking Exposed Unified Communications & VoIP," Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Proven security tactics for today's mobile apps,devices, and networks"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depthunderstanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling toiOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists
Take a fascinating and provocative look at cyber crime and warfare In "Cyber Crime & Warfare: All That Matters," Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage, and cyber warfare now pose a major threat to society. The authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect at a time when the modern world--including all the communication services and utilities we have come to take for granted--has become utterly dependent on computers and the internet. Inside you will find: A 100 Ideas section that offers original and inspirational ideas to help readers explore the subject in more depth Weblinks and QR codes throughout the text, linking to videos from the author, or more detailed audio explanations Helpful text boxes around key concepts that make navigating through the material a snap
The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimises computer systems. It is a computer security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills crack and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of section 1030 and some of its federal statutory companions. Subsection 1030(b) makes it a crime to attempt to commit any of these offences. Subsection 1030(c) catalogues the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action of victims of these crimes.
Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a co-ordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists' goals. While there is no published evidence that terrorist organisations are currently planning a co-ordinated attack against computers, computer system vulnerabilities persist world-wide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called "bots", that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The book also describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. Issues for Congress may include how could trends in cyberattacks be measured more effectively; what is appropriate guidance for DOD use of cyberweapons; should cybersecurity be combined with, or remain separate from, the physical security organization within DHS; how can commercial vendors be encouraged to improve the security of their products; and what are options to encourage U.S. citizens to follow better cybersecurity practices? Appendices to this book describe computer viruses, spyware, and "bot networks", and how malicious programs are used to enable cybercrime and cyberespionage. Also, similarities are drawn between planning tactics currently used by computer hackers and those used by terrorists groups for conventional attacks.
Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find -- everything from bank accounts to military secrets. In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more.
This book isn't about cybersecurity, it's about life. Specifically, connected life in the 21st century. It's about the behaviours we need to change and the threats we need to be aware of to ensure that we can keep ourselves and our families as safe as possible in the new connected world. We are the pioneers in connectivity and this world is evolving in a way that none of us has ever seen before. This book will cover elements of 21st century life which will be familiar to all consumers - from social media, to email hacking, to content theft, to connected devices and even connected cars. It will steer clear of just dryly delivering facts but will use true anecdotes to tell stories of the dangers of connectivity to us all, every day, and how we can make simple changes to live our connected lives more safely. * Honest, jargon-free advice on how to keep your data safe in an increasingly complex digital world * Topical and engaging examples from across the consumer, digital and corporate worlds * Covers everything from passwords to talking assistants, phishing to social media |
![]() ![]() You may like...
Detection Systems in Lung Cancer and…
Ayman El-Baz, Jasjit Suri
Hardcover
R3,475
Discovery Miles 34 750
Emerging Innovations in Microwave and…
Jamal Zbitou, Ahmed Errkik
Hardcover
R6,646
Discovery Miles 66 460
Diagnostic Radiology Physics with MATLAB…
Johan Helmenkamp, Robert Bujila, …
Paperback
R1,543
Discovery Miles 15 430
Computational Fluid and Particle…
Jiyuan Tu, Kiao Inthavong, …
Paperback
R5,889
Discovery Miles 58 890
|