0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (28)
  • R500+ (296)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Security, Privacy and User Interaction (Hardcover, 1st ed. 2020): Markus Jakobsson Security, Privacy and User Interaction (Hardcover, 1st ed. 2020)
Markus Jakobsson
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Hardcover): Erica Stanford Crypto Wars - Faked Deaths, Missing Billions and Industry Disruption (Hardcover)
Erica Stanford
R1,305 R1,083 Discovery Miles 10 830 Save R222 (17%) Ships in 18 - 22 working days

HIGHLY COMMENDED: Business Book Awards 2022 - Specialist Business Book Crypto is big news. You may be an existing user yourself or have friends that laud its promise of getting rich fast. Arm yourself with the knowledge to come out on top in the crypto wars. If thousands of people can lose billions of dollars in OneCoin, masterminded by the now infamous Missing Cryptoqueen made famous by the BBC's podcast series and called 'one of the biggest scams in history' by The Times, what makes you think your money is safe? OneCoin isn't alone. Crypto Wars reveals how some of the most shocking scams affected millions of innocent people all around the world with everything from religious leaders to celebrities involved. In this book, you get exclusive access to the back story of the most extreme Ponzi schemes, the most bizarre hoaxes and brutal exit strategies from some of the biggest charlatans of crypto. Crypto expert and educator, Erica Stanford, will show you how market-wide manipulation schemes, unregulated processes and a new collection of technologies that are often misunderstood, have been exploited to create the wild west of crypto, run by some less than reputable characters. From OneCoin to PonziCoin to Trumpcoin and everything in between, Crypto Wars uncovers the scandals, unpicks the system behind them and allows you to better understand a new technology that has the potential to revolutionize banking and our world for the better.

Cyber and the City - Securing London's Banks in the Computer Age (Hardcover, 1st ed. 2022): Ashley Sweetman Cyber and the City - Securing London's Banks in the Computer Age (Hardcover, 1st ed. 2022)
Ashley Sweetman
R699 Discovery Miles 6 990 Ships in 10 - 15 working days

Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers. Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital's oldest area and historically its business and commerce hub, the colossal clearing banks employed newly commercialised electronic computers-the processing power of which could transform the highly clerical clearing and settlement process. What unfolded over the following three decades was a relentless modernisation drive. Revolutionising the way that banks and other financial institutions conducted business and interacted with each other and permanently altering the speed and scale at which the United Kingdom's financial sector functioned, this rapid modernisation thrust computer security into the consciousness of bank executives and their clients alike. Dependence on computers quickly grew, and the banks immediately realised the need to secure their new software and hardware. Focusing on the period 1960 to 1990, this book uses newly released and previously unexplored archival material to trace the origins of cyber security in the UK financial sector. Topics and features: Describes how institutions managed the evolving challenge of computer security in the second half of the 20th century Demonstrates continuity in banks' views of security through the prism of confidentiality, integrity and availability, and the concept of resilience Presents case studies of bank collaboration on computer security through creation of payment systems like SWIFT and CHAPS Outlines the shift from focusing on physical security measures to technical network-protection measures Explores the relationship between banks and the UK Government as bank operations became dependent on computer and network technology This work will be of value to students and academic researchers in the history of computing, financial history, and the history of intelligence and security, as well as the general reader interested in contemporary intelligence, cyber security, and finance.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R759 Discovery Miles 7 590 Ships in 10 - 15 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

Hands on Hacking (Paperback): M. Hickey Hands on Hacking (Paperback)
M. Hickey
R1,028 R864 Discovery Miles 8 640 Save R164 (16%) Ships in 9 - 17 working days

A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits--including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.

The Construction of Truth in Contemporary Media Narratives about Risk (Paperback): John Gaffey The Construction of Truth in Contemporary Media Narratives about Risk (Paperback)
John Gaffey
R1,289 Discovery Miles 12 890 Ships in 10 - 15 working days

The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk. The book examines media risk narratives and explores forms of truth, experiential knowledge, and authority. Using the concept of parrhesia to show how we invest trust in various types of knowledge in a changing media environment, the book demonstrates how we choose between expert and non-expert information when navigating a seemingly risky world. It considers how news media formats have previously engaged audiences through risk narratives and examines how experiential knowledge has come to hold a valuable place for individuals navigating what we are often told is an increasingly risky and uncertain world. The book also examines the increasingly precarious position of expert knowledge and examines how contemporary truth-games play out between experts and non-experts, and considers how this extends into the world of online and social media. This book will be of interest to those researching or teaching in the areas of criminology, sociology, media and cultural studies, and of interest to readers in professional areas such as journalism and politics.

Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Paperback): Andreas Marklund, Laura... Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Paperback)
Andreas Marklund, Laura Skouvig
R1,294 Discovery Miles 12 940 Ships in 10 - 15 working days

Deploying empirical studies spanning from early Imperial China to the present day, 17 scholars from across the globe explore the history of surveillance with special attention to the mechanisms of power that impel the concept of surveillance in society. By delving into a broad range of historical periods and contexts, the book sheds new light on surveillance as a societal phenomenon, offering 10 in-depth, applied analyses that revolve around two main questions: * Who are the central actors in the history of surveillance? * What kinds of phenomena have been deemed eligible for surveillance, for example, information flows, political movements, border-crossing trade, interacting with foreign states, workplace relations, gender relations, andsexuality?

Secure, Resilient, and Agile Software Development (Paperback): Mark Merkow Secure, Resilient, and Agile Software Development (Paperback)
Mark Merkow
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

Hacking Wireless Access Points - Cracking, Tracking, and Signal Jacking (Paperback): Jennifer Ann Kurtz Hacking Wireless Access Points - Cracking, Tracking, and Signal Jacking (Paperback)
Jennifer Ann Kurtz
R1,019 Discovery Miles 10 190 Ships in 10 - 15 working days

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.

Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised... Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers (Hardcover, 1st ed. 2019)
Gilbert Peterson, Sujeet Shenoi
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: forensic models, mobile and embedded device forensics, filesystem forensics, image forensics, and forensic techniques. This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. Advances in Digital Forensics XV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Paperback): Lev Topor Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Paperback)
Lev Topor
R1,177 Discovery Miles 11 770 Ships in 10 - 15 working days

Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web. It unveils how hatred and conspiracies spread and thrive online and how white supremacy is becoming prominent as extremists find shelter in the online dank underbelly of society. Phishing for Nazis explains how online manifestations of hate radicalize people into taking "real-world" action, such as shooting sprees. Methodologically, this book is unique, as it incorporates undercover cyberethnography, a method frequently used by law enforcement and intelligence agencies, unlike traditional academic studies of racism or social behavior that rely on secondary sources or surveys. With a particular interest on how race issues translate online, the book presents the true phenomenon of racism without relying on political correctness or whitewashing. It contributes to the field of cyber communication, as it details why and how people communicate and manage entire communities without knowing one another. The book also contributes to public policy, regulators, and technology companies as they deal with the practice of online anonymity and extremism.

Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Hardcover): Lev Topor Phishing for Nazis - Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web (Hardcover)
Lev Topor
R4,067 Discovery Miles 40 670 Ships in 10 - 15 working days

Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web. It unveils how hatred and conspiracies spread and thrive online and how white supremacy is becoming prominent as extremists find shelter in the online dank underbelly of society. Phishing for Nazis explains how online manifestations of hate radicalize people into taking "real-world" action, such as shooting sprees. Methodologically, this book is unique, as it incorporates undercover cyberethnography, a method frequently used by law enforcement and intelligence agencies, unlike traditional academic studies of racism or social behavior that rely on secondary sources or surveys. With a particular interest on how race issues translate online, the book presents the true phenomenon of racism without relying on political correctness or whitewashing. It contributes to the field of cyber communication, as it details why and how people communicate and manage entire communities without knowing one another. The book also contributes to public policy, regulators, and technology companies as they deal with the practice of online anonymity and extremism.

Cybersecurity Ethics - An Introduction (Paperback, 2nd edition): Mary Manjikian Cybersecurity Ethics - An Introduction (Paperback, 2nd edition)
Mary Manjikian
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI, and Big Data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy, and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics, and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance, and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, Big Data, and cyberwarfare. The overall aims of the book are to: Provide ethical frameworks to aid decision-making Present the key ethical issues in relation to computer security Highlight the connection between values and beliefs and the professional code of ethics The textbook also includes three different features to aid students: "Going Deeper" features provide background on individuals, events, and institutions in cybersecurity; "Critical Issues" features contemporary case studies; and "Tech Talks" contain features that assume some familiarity with technological developments. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics, and information science.

The Evolution of Law against Payment Frauds (Paperback): Christopher Chen The Evolution of Law against Payment Frauds (Paperback)
Christopher Chen
R1,239 Discovery Miles 12 390 Ships in 10 - 15 working days

This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing payment systems ('payment fraud', e.g. forged cheques, wrongful payment instructions, etc.) in Asia, focusing on laws in Greater China and Singapore. In the past century, the payment system has invited much innovation, changing the modes of payments from exchanging cash and coins to the use of cards, wire transfers and other new types of payment instruments or services (e.g. bitcoins or QR code payments). As the nature of payment services is to move money from one place to another, it naturally attracts fraudsters. Even with advanced computer technology, payment fraud is still rampant in the market, causing billions of dollars in losses globally per annum. Through an examination of payment instruments and associated frauds over time, the book illustrates a shifting trend of legal solutions from criminal sanctions and civil compensation to a gradual focus on regulations of payment intermediaries. This trend reflects the complexity of payment systems and the challenge of protecting them. The book also identifies the underlying actors and institutional characteristics driving the evolution of legal institutions to deal with payment fraud and illustrates how the arrival of new technology may affect the market and thus the evolution of legal institutions. The book will help readers to better understand the interaction between technology, the market and law and help regulators, financial institutions, practitioners and end users, as well as about payment fraud and corresponding legal responses.

The Evolution of Law against Payment Frauds (Hardcover): Christopher Chen The Evolution of Law against Payment Frauds (Hardcover)
Christopher Chen
R4,073 Discovery Miles 40 730 Ships in 10 - 15 working days

This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing payment systems ('payment fraud', e.g. forged cheques, wrongful payment instructions, etc.) in Asia, focusing on laws in Greater China and Singapore. In the past century, the payment system has invited much innovation, changing the modes of payments from exchanging cash and coins to the use of cards, wire transfers and other new types of payment instruments or services (e.g. bitcoins or QR code payments). As the nature of payment services is to move money from one place to another, it naturally attracts fraudsters. Even with advanced computer technology, payment fraud is still rampant in the market, causing billions of dollars in losses globally per annum. Through an examination of payment instruments and associated frauds over time, the book illustrates a shifting trend of legal solutions from criminal sanctions and civil compensation to a gradual focus on regulations of payment intermediaries. This trend reflects the complexity of payment systems and the challenge of protecting them. The book also identifies the underlying actors and institutional characteristics driving the evolution of legal institutions to deal with payment fraud and illustrates how the arrival of new technology may affect the market and thus the evolution of legal institutions. The book will help readers to better understand the interaction between technology, the market and law and help regulators, financial institutions, practitioners and end users, as well as about payment fraud and corresponding legal responses.

What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Hardcover): Shimon... What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Hardcover)
Shimon Brathwaite
R2,029 Discovery Miles 20 290 Ships in 18 - 22 working days

1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses

What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback): Shimon... What To Do When You Get Hacked - A Practitioner's Guide to Incident Response in the 21st Century (Paperback)
Shimon Brathwaite
R1,291 Discovery Miles 12 910 Ships in 10 - 15 working days

1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses

Data Protection on the Move - Current Developments in ICT and Privacy/Data Protection (Hardcover, 1st ed. 2016): Serge... Data Protection on the Move - Current Developments in ICT and Privacy/Data Protection (Hardcover, 1st ed. 2016)
Serge Gutwirth, Ronald Leenes, Paul De Hert
R4,903 Discovery Miles 49 030 Ships in 10 - 15 working days

This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

White-Collar Crime Online - Deviance, Organizational Behaviour and Risk (Hardcover, 1st ed. 2022): Petter Gottschalk,... White-Collar Crime Online - Deviance, Organizational Behaviour and Risk (Hardcover, 1st ed. 2022)
Petter Gottschalk, Christopher Hamerton
R3,127 Discovery Miles 31 270 Ships in 18 - 22 working days

This initiating monograph provides the first thorough examination of the concept of white-collar crime online. Applying an offender-based perspective which considers the central role of convenience, it seeks to inform, improve and develop the current literature on cybercrime, whilst paying particular attention to its founding category within criminology. It argues that white-collar crime has receded from criminological perspectives on cybercrime in recent years and that a detailed, rich re-assessment of white-collar crime in contemporary digital societies is needed. Following a theoretical introduction, the book develops to discuss, inter alia, implications for corporate reputation, the various organizational roles utilized in mitigating external and internal threats, the unique considerations involved in law enforcement efforts, and likely future directions within the field. White-Collar Crime Online recognises the strong lineage and correlation that exists between the study of white-collar crime and cybercrime. Using convenience theory within a comparative analysis which includes case-studies, the book explores both European and American paradigms, perspectives and models to determine where white-collar crime exists within the contemporary workplace and how this might relate to the ongoing discourse on cybercrime. In doing so it revaluates criminological theory within the context of changing patterns of business, the workplace, social rules, systems of governance, decision making, social ordering and control. White-Collar Crime Online will speak to criminologists, sociologists and professionals; including those interested in cyber-security, economics, technology and computer science.

Zero Trust Journey Across the Digital Estate (Paperback): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Paperback)
Abbas Kudrati, Binil A. Pillai
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Botnets - Architectures, Countermeasures, and Challenges (Paperback): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Paperback)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,358 Discovery Miles 33 580 Ships in 18 - 22 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Hardcover, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,486 Discovery Miles 14 860 Ships in 18 - 22 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Digital Forensics in the Era of Artificial Intelligence (Paperback): Nour Moustafa Digital Forensics in the Era of Artificial Intelligence (Paperback)
Nour Moustafa
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

Digital Forensics in the Era of Artificial Intelligence (Hardcover): Nour Moustafa Digital Forensics in the Era of Artificial Intelligence (Hardcover)
Nour Moustafa
R2,745 Discovery Miles 27 450 Ships in 10 - 15 working days

Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Psychology of Expertise - Cognitive…
Robert R. Hoffman Hardcover R4,522 Discovery Miles 45 220
Decision-Analytic Intelligent Systems…
David A. Klein Hardcover R4,481 Discovery Miles 44 810
Building Expert Systems in Training and…
R.Scott Grabinger, David H Jonassen, … Hardcover R2,218 R2,049 Discovery Miles 20 490
Intelligence Integration in Distributed…
Dariusz Krol, Ngoc Thanh Nguyen Hardcover R4,955 Discovery Miles 49 550
Knowledge-Based Software Engineering
Dorothy E Setliff, Howard Reubenstein Hardcover R2,707 Discovery Miles 27 070
Smart Information and Knowledge…
Edward Szczerbicki Hardcover R4,197 Discovery Miles 41 970
Socrates Digital (TM) for Learning and…
Mark Salisbury Hardcover R5,931 Discovery Miles 59 310
Fuzzy Graphs and Fuzzy Hypergraphs
John N. Mordeson, Premchand S. Nair Hardcover R4,040 Discovery Miles 40 400
Marriage, As It Was, As It Is, and As It…
Annie Besant Hardcover R646 Discovery Miles 6 460
Wild Wild Guru - An insider's account of…
Subhuti Anand Waight Hardcover  (1)
R688 Discovery Miles 6 880

 

Partners