![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk. The book examines media risk narratives and explores forms of truth, experiential knowledge, and authority. Using the concept of parrhesia to show how we invest trust in various types of knowledge in a changing media environment, the book demonstrates how we choose between expert and non-expert information when navigating a seemingly risky world. It considers how news media formats have previously engaged audiences through risk narratives and examines how experiential knowledge has come to hold a valuable place for individuals navigating what we are often told is an increasingly risky and uncertain world. The book also examines the increasingly precarious position of expert knowledge and examines how contemporary truth-games play out between experts and non-experts, and considers how this extends into the world of online and social media. This book will be of interest to those researching or teaching in the areas of criminology, sociology, media and cultural studies, and of interest to readers in professional areas such as journalism and politics.
Deploying empirical studies spanning from early Imperial China to the present day, 17 scholars from across the globe explore the history of surveillance with special attention to the mechanisms of power that impel the concept of surveillance in society. By delving into a broad range of historical periods and contexts, the book sheds new light on surveillance as a societal phenomenon, offering 10 in-depth, applied analyses that revolve around two main questions: * Who are the central actors in the history of surveillance? * What kinds of phenomena have been deemed eligible for surveillance, for example, information flows, political movements, border-crossing trade, interacting with foreign states, workplace relations, gender relations, andsexuality?
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: forensic models, mobile and embedded device forensics, filesystem forensics, image forensics, and forensic techniques. This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. Advances in Digital Forensics XV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web. It unveils how hatred and conspiracies spread and thrive online and how white supremacy is becoming prominent as extremists find shelter in the online dank underbelly of society. Phishing for Nazis explains how online manifestations of hate radicalize people into taking "real-world" action, such as shooting sprees. Methodologically, this book is unique, as it incorporates undercover cyberethnography, a method frequently used by law enforcement and intelligence agencies, unlike traditional academic studies of racism or social behavior that rely on secondary sources or surveys. With a particular interest on how race issues translate online, the book presents the true phenomenon of racism without relying on political correctness or whitewashing. It contributes to the field of cyber communication, as it details why and how people communicate and manage entire communities without knowing one another. The book also contributes to public policy, regulators, and technology companies as they deal with the practice of online anonymity and extremism.
Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web. It unveils how hatred and conspiracies spread and thrive online and how white supremacy is becoming prominent as extremists find shelter in the online dank underbelly of society. Phishing for Nazis explains how online manifestations of hate radicalize people into taking "real-world" action, such as shooting sprees. Methodologically, this book is unique, as it incorporates undercover cyberethnography, a method frequently used by law enforcement and intelligence agencies, unlike traditional academic studies of racism or social behavior that rely on secondary sources or surveys. With a particular interest on how race issues translate online, the book presents the true phenomenon of racism without relying on political correctness or whitewashing. It contributes to the field of cyber communication, as it details why and how people communicate and manage entire communities without knowing one another. The book also contributes to public policy, regulators, and technology companies as they deal with the practice of online anonymity and extremism.
This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI, and Big Data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy, and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics, and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance, and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, Big Data, and cyberwarfare. The overall aims of the book are to: Provide ethical frameworks to aid decision-making Present the key ethical issues in relation to computer security Highlight the connection between values and beliefs and the professional code of ethics The textbook also includes three different features to aid students: "Going Deeper" features provide background on individuals, events, and institutions in cybersecurity; "Critical Issues" features contemporary case studies; and "Tech Talks" contain features that assume some familiarity with technological developments. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics, and information science.
This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing payment systems ('payment fraud', e.g. forged cheques, wrongful payment instructions, etc.) in Asia, focusing on laws in Greater China and Singapore. In the past century, the payment system has invited much innovation, changing the modes of payments from exchanging cash and coins to the use of cards, wire transfers and other new types of payment instruments or services (e.g. bitcoins or QR code payments). As the nature of payment services is to move money from one place to another, it naturally attracts fraudsters. Even with advanced computer technology, payment fraud is still rampant in the market, causing billions of dollars in losses globally per annum. Through an examination of payment instruments and associated frauds over time, the book illustrates a shifting trend of legal solutions from criminal sanctions and civil compensation to a gradual focus on regulations of payment intermediaries. This trend reflects the complexity of payment systems and the challenge of protecting them. The book also identifies the underlying actors and institutional characteristics driving the evolution of legal institutions to deal with payment fraud and illustrates how the arrival of new technology may affect the market and thus the evolution of legal institutions. The book will help readers to better understand the interaction between technology, the market and law and help regulators, financial institutions, practitioners and end users, as well as about payment fraud and corresponding legal responses.
This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing payment systems ('payment fraud', e.g. forged cheques, wrongful payment instructions, etc.) in Asia, focusing on laws in Greater China and Singapore. In the past century, the payment system has invited much innovation, changing the modes of payments from exchanging cash and coins to the use of cards, wire transfers and other new types of payment instruments or services (e.g. bitcoins or QR code payments). As the nature of payment services is to move money from one place to another, it naturally attracts fraudsters. Even with advanced computer technology, payment fraud is still rampant in the market, causing billions of dollars in losses globally per annum. Through an examination of payment instruments and associated frauds over time, the book illustrates a shifting trend of legal solutions from criminal sanctions and civil compensation to a gradual focus on regulations of payment intermediaries. This trend reflects the complexity of payment systems and the challenge of protecting them. The book also identifies the underlying actors and institutional characteristics driving the evolution of legal institutions to deal with payment fraud and illustrates how the arrival of new technology may affect the market and thus the evolution of legal institutions. The book will help readers to better understand the interaction between technology, the market and law and help regulators, financial institutions, practitioners and end users, as well as about payment fraud and corresponding legal responses.
This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI, and Big Data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy, and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics, and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance, and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, Big Data, and cyberwarfare. The overall aims of the book are to: Provide ethical frameworks to aid decision-making Present the key ethical issues in relation to computer security Highlight the connection between values and beliefs and the professional code of ethics The textbook also includes three different features to aid students: "Going Deeper" features provide background on individuals, events, and institutions in cybersecurity; "Critical Issues" features contemporary case studies; and "Tech Talks" contain features that assume some familiarity with technological developments. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics, and information science.
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
This initiating monograph provides the first thorough examination of the concept of white-collar crime online. Applying an offender-based perspective which considers the central role of convenience, it seeks to inform, improve and develop the current literature on cybercrime, whilst paying particular attention to its founding category within criminology. It argues that white-collar crime has receded from criminological perspectives on cybercrime in recent years and that a detailed, rich re-assessment of white-collar crime in contemporary digital societies is needed. Following a theoretical introduction, the book develops to discuss, inter alia, implications for corporate reputation, the various organizational roles utilized in mitigating external and internal threats, the unique considerations involved in law enforcement efforts, and likely future directions within the field. White-Collar Crime Online recognises the strong lineage and correlation that exists between the study of white-collar crime and cybercrime. Using convenience theory within a comparative analysis which includes case-studies, the book explores both European and American paradigms, perspectives and models to determine where white-collar crime exists within the contemporary workplace and how this might relate to the ongoing discourse on cybercrime. In doing so it revaluates criminological theory within the context of changing patterns of business, the workplace, social rules, systems of governance, decision making, social ordering and control. White-Collar Crime Online will speak to criminologists, sociologists and professionals; including those interested in cyber-security, economics, technology and computer science.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.
Features cross-disciplinary exchange among psychologists, criminologists, and computer scientists addressing fraud, scams, and financial abuse Includes discussion of the 'Next Frontiers' in research and important insights on how to create solutions
Unique selling point: * Set up to be used as a college textbook with a complete "Case Study" that involves the use of Python (a very key programming language at this time) Core audience: * Cyber security professionals, college students in a cyber forensics class, and individuals interested in cyber crime Place in the market: * Will build on the success of the previous two editions
This book offers a fresh approach to a range of pressing issues, emphasising the value of establishing economic crime as a sub-discipline within criminology. This will be essential reading for a range of more applied graduate courses across the UK and Europe on counter-fraud, money laundering, corruption, security management and financial crime investigation. Given the prominence of 'economic crime' amongst police forces, law enforcement agencies and government, this book has a secondary market amongst practitioners.
* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events. |
You may like...
|