0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (27)
  • R500+ (294)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

The SME Business Guide to Fraud Risk Management (Hardcover): Robert James Chapman The SME Business Guide to Fraud Risk Management (Hardcover)
Robert James Chapman
R4,531 Discovery Miles 45 310 Ships in 10 - 15 working days

* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events.

The Rise of Politically Motivated Cyber Attacks - Actors, Attacks and Cybersecurity (Hardcover): Tine Munk The Rise of Politically Motivated Cyber Attacks - Actors, Attacks and Cybersecurity (Hardcover)
Tine Munk
R4,498 Discovery Miles 44 980 Ships in 10 - 15 working days

This book outlines the complexity in understanding different forms of cyber attacks, the actors involved, and their motivations. It explores the key challenges in investigating and prosecuting politically motivated cyber attacks, the lack of consistency within regulatory frameworks, and the grey zone that this creates, for cybercriminals to operate within. Connecting diverse literatures on cyberwarfare, cyberterrorism, and cyberprotests, and categorising the different actors involved - state-sponsored/supported groups, hacktivists, online protestors - this book compares the means and methods used in attacks, the various attackers, and the current strategies employed by cybersecurity agencies. It examines the current legislative framework and proposes ways in which it could be reconstructed, moving beyond the traditional and fragmented definitions used to manage offline violence. This book is an important contribution to the study of cyber attacks within the areas of criminology, criminal justice, law, and policy. It is a compelling reading for all those engaged in cybercrime, cybersecurity, and digital forensics.

Making Sense of Cyber Capabilities for Small States - Case Studies from the Asia-Pacific (Hardcover): Francis C. Domingo Making Sense of Cyber Capabilities for Small States - Case Studies from the Asia-Pacific (Hardcover)
Francis C. Domingo
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

Domingo explores the potential of cyber capabilities for small states in the Asia-Pacific, the most active region for cyber conflict. He develops a systematic explanation for why Brunei, New Zealand, and Singapore have developed or are developing cyber capabilities. Studies on cyber conflict and strategy have substantially increased in the past decade but most have focused on the cyber operations of powerful states. This book moves away from the prominence of powerful states and explores the potential of cyber capabilities for small states in the Asia-Pacific, the most active region for cyber conflict. It develops a systematic explanation of why Brunei, New Zealand, and Singapore have developed or are developing cyber capabilities despite its obscure strategic value. The book argues that the distribution of power in the region and a "technology-oriented" strategic culture are two necessary conditions that influence the development of cyber capabilities in small states. Following this argument, the book draws on neoclassical realism as a theoretical framework to account for the interaction between these two conditions. The book also pursues three secondary objectives. First, it aims to determine the constraints and incentives that affect the utilization of cyber capabilities as foreign policy instruments. Second, the book evaluates the functionality of these cyber capabilities for small states. Lastly, it assesses the implications of employing cyber capabilities as foreign policy tools of small states. This book will be an invaluable resource for academics and security analysts working on cyber conflict, military strategy, small states, and International Relations in general.

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,505 Discovery Miles 35 050 Ships in 10 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,175 Discovery Miles 11 750 Ships in 10 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

The Basics of Web Hacking - Tools and Techniques to Attack the Web (Paperback, New): Josh Pauli The Basics of Web Hacking - Tools and Techniques to Attack the Web (Paperback, New)
Josh Pauli
R593 R551 Discovery Miles 5 510 Save R42 (7%) Ships in 10 - 15 working days

"The Basics of Web Hacking" introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities.

"The Basics of Web Hacking "provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user.

With Dr. Pauli s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.
Provides a simple and clean approach to Web hacking, including hands-on examples and exercises that are designed to teach you how to hack the server, hack the Web app, and hack the Web user Covers the most significant new tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more Written by an author who works in the field as a penetration tester and who teaches Web security classes at Dakota State University"

Hacking Web Apps - Detecting and Preventing Web Application Security Problems (Paperback): Mike Shema Hacking Web Apps - Detecting and Preventing Web Application Security Problems (Paperback)
Mike Shema
R1,019 R868 Discovery Miles 8 680 Save R151 (15%) Ships in 10 - 15 working days

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read "Hacking Web Apps." The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

SQL Injection

Cross Site Scripting

Logic Attacks

Server Misconfigurations

Predictable Pages

Web of Distrust

Breaking Authentication Schemes

HTML5 Security Breaches

Attacks on Mobile Apps

Even if you don t develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, "Hacking Web Apps" gives you detailed steps to make the web browser - sometimes your last line of defense - more secure.
More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more."

Advanced Cybersecurity Technologies (Hardcover): Ralph Moseley Advanced Cybersecurity Technologies (Hardcover)
Ralph Moseley
R4,346 Discovery Miles 43 460 Ships in 10 - 15 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Advanced Cybersecurity Technologies (Paperback): Ralph Moseley Advanced Cybersecurity Technologies (Paperback)
Ralph Moseley
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Nanoelectronic Devices for Hardware and Software Security (Hardcover): Balwinder Raj, Arun Kumar Singh Nanoelectronic Devices for Hardware and Software Security (Hardcover)
Balwinder Raj, Arun Kumar Singh
R3,386 Discovery Miles 33 860 Ships in 10 - 15 working days

Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems. The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues.

Theories of Terrorism - Contemporary Perspectives (Hardcover): Murat Haner, Melissa M. Sloan Theories of Terrorism - Contemporary Perspectives (Hardcover)
Murat Haner, Melissa M. Sloan
R4,520 Discovery Miles 45 200 Ships in 10 - 15 working days

The key feature of the text is its concise, scholarly depth, and accessible format, which enable readers to gain a clear understanding of the theory that they may use in future research. Current texts on the market include redundant, lengthy presentations of theories that fail to distinguish among key theoretical contributions. Terrorism is an area of urgent global concern. The number of terrorism and homeland security-focused academic programs, think tanks, and research centers has dramatically increased over the past two decades. Many universities now offer courses on issues related to terrorism at both the undergraduate and graduate levels within the social science disciplines as well as interdisciplinary centers. Yet, there is only one text and a few book chapters on theories of terrorism. The approach that we will use in the book will make it attractive to academics, students, and policy makers who seek to develop theoretically-driven approaches to policy making. Considering the current number of programs on terrorism and homeland security within the United States alone, the growing emphasis on terrorism studies across the world, and the absence of a clear text on theories of terrorism, the demand should be quite high. This will be the only text that offers chapter-length descriptions of each stage of the radicalization process covering pressing issues in the field of terrorism.

Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback): Debarati Halder Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback)
Debarati Halder
R1,254 Discovery Miles 12 540 Ships in 10 - 15 working days

Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,795 Discovery Miles 37 950 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

National Cyber Emergencies - The Return to Civil Defence (Paperback): Greg Austin National Cyber Emergencies - The Return to Civil Defence (Paperback)
Greg Austin
R1,387 Discovery Miles 13 870 Ships in 10 - 15 working days

This book documents and explains civil defence preparations for national cyber emergencies in conditions of both peace and war. The volume analyses the escalating sense of crisis around state-sponsored cyber attacks that has emerged since 2015, when the United States first declared a national emergency in cyberspace. It documents a shift in thinking in the USA, from cooperative resilience-oriented approaches at national level to more highly regulated, state-led civil defence initiatives. Although the American response has been mirrored in other countries, the shift is far from universal. Civil defence strategies have come into play but the global experience of that has not been consistent or even that successful. Containing contributions from well-placed scholars and practitioners, this volume reviews a selection of national experiences (from the USA, Australia, India, China, Estonia, and Finland) and a number of key thematic issues (information weapons, alliance coordination, and attack simulations). These demonstrate a disconnect between the deepening sense of vulnerability and the availability of viable solutions at the national level. Awareness of this gap may ultimately lead to more internationally oriented cooperation, but the trend for now appears to be more conflictual and rooted in a growing sense of insecurity. This book will be of much interest to students of cyber security, homeland security, disaster management, and international relations, as well as practitioners and policy-makers.

Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover): Abbas Moallem Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover)
Abbas Moallem
R2,798 Discovery Miles 27 980 Ships in 10 - 15 working days

Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field. FEATURES Presents descriptions for each type of cybersecurity technology and their specifications Explains applications, usages, and offers case studies to enhance comprehension Offers an easy-to-understand classification of existing cybersecurity technologies Provides an understanding of the technologies without getting lost in technical details Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.

Crime Science and Digital Forensics - A Holistic View (Hardcover): Anthony C. Ijeh, Kevin Curran Crime Science and Digital Forensics - A Holistic View (Hardcover)
Anthony C. Ijeh, Kevin Curran
R4,077 Discovery Miles 40 770 Ships in 10 - 15 working days

Reinforces basic principles of digital forensic science with examples of current trends and future prospects Broadens the readers understanding of digital forensic investigations and information security techniques using crime science Shares many tips and insights into unexplored areas of digital forensics and information security from scholars, practitioners and policy makers. Provides a level of language that suits all audiences across the globe Supplies opportunities to practice techniques which demonstrate how crime science can be used to enrich digital forensics and information security

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R4,214 Discovery Miles 42 140 Ships in 10 - 15 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Cybersecurity Issues in Emerging Technologies (Hardcover): Leandros Maglaras, Ioanna Kantzavelou Cybersecurity Issues in Emerging Technologies (Hardcover)
Leandros Maglaras, Ioanna Kantzavelou
R2,430 Discovery Miles 24 300 Ships in 10 - 15 working days

The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.

Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Hardcover): Andreas Marklund, Laura... Histories of Surveillance from Antiquity to the Digital Era - The Eyes and Ears of Power (Hardcover)
Andreas Marklund, Laura Skouvig
R4,495 Discovery Miles 44 950 Ships in 10 - 15 working days

Deploying empirical studies spanning from early Imperial China to the present day, 17 scholars from across the globe explore the history of surveillance with special attention to the mechanisms of power that impel the concept of surveillance in society. By delving into a broad range of historical periods and contexts, the book sheds new light on surveillance as a societal phenomenon, offering 10 in-depth, applied analyses that revolve around two main questions: * Who are the central actors in the history of surveillance? * What kinds of phenomena have been deemed eligible for surveillance, for example, information flows, political movements, border-crossing trade, interacting with foreign states, workplace relations, gender relations, andsexuality?

Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Paperback): Andrew A. Bochman,... Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Paperback)
Andrew A. Bochman, Sarah Freeman
R1,107 Discovery Miles 11 070 Ships in 10 - 15 working days

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.

Rhetoric of InSecurity - The Language of Danger, Fear and Safety in National and International Contexts (Hardcover): Victoria... Rhetoric of InSecurity - The Language of Danger, Fear and Safety in National and International Contexts (Hardcover)
Victoria Baines
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

This book demands that we question what we are told about security, using tools we have had for thousands of years. The work considers the history of security rhetoric in a number of distinct but related contexts, including the United States' security strategy, the "war" on Big Tech, and current concerns such as cybersecurity. Focusing on the language of security discourse, it draws common threads from the ancient world to the present day and the near future. The book grounds recent comparisons of Donald Trump to the Emperor Nero in a linguistic evidence base. It examines the potential impact on society of policy-makers' emphasis on the novelty of cybercrime, their likening of the internet to the Wild West, and their claims that criminals have "gone dark". It questions governments' descriptions of technology companies in words normally reserved for terrorists, and asks who might benefit. Interdisciplinary in approach, the book builds on existing literature in the Humanities and Social Sciences, most notably studies on rhetoric in Greco-Roman texts, and on the articulation of security concerns in law, international relations, and public policy contexts. It adds value to this body of research by offering new points of comparison, and a fresh but tried and tested way of looking at problems that are often presented as unprecedented. It will be essential to legal and policy practitioners, students of Law, Politics, Media, and Classics, and all those interested in employing critical thinking.

Advanced Security Solutions for Multimedia (Hardcover): Irshad Ahmad Ansari, Varun Bajaj Advanced Security Solutions for Multimedia (Hardcover)
Irshad Ahmad Ansari, Varun Bajaj; Contributions by Rishi Sinhal, Tarun Kumar Sharma, Esmaeil Najafi, …
R3,276 Discovery Miles 32 760 Ships in 10 - 15 working days
The Construction of Truth in Contemporary Media Narratives about Risk (Hardcover): John Gaffey The Construction of Truth in Contemporary Media Narratives about Risk (Hardcover)
John Gaffey
R4,473 Discovery Miles 44 730 Ships in 10 - 15 working days

The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk. The book examines media risk narratives and explores forms of truth, experiential knowledge, and authority. Using the concept of parrhesia to show how we invest trust in various types of knowledge in a changing media environment, the book demonstrates how we choose between expert and non-expert information when navigating a seemingly risky world. It considers how news media formats have previously engaged audiences through risk narratives and examines how experiential knowledge has come to hold a valuable place for individuals navigating what we are often told is an increasingly risky and uncertain world. The book also examines the increasingly precarious position of expert knowledge and examines how contemporary truth-games play out between experts and non-experts, and considers how this extends into the world of online and social media. This book will be of interest to those researching or teaching in the areas of criminology, sociology, media and cultural studies, and of interest to readers in professional areas such as journalism and politics.

National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Paperback): Sybil... National Security, Personal Privacy and the Law - Surveying Electronic Surveillance and Data Acquisition (Paperback)
Sybil Sharpe
R1,367 Discovery Miles 13 670 Ships in 10 - 15 working days

There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal. This book re-evaluates competing arguments between national security and personal privacy. The increased assimilation between the investigatory powers of the intelligence services and the police and revelations of unauthorised surveillance have resulted in increased demands for transparency in information gathering and for greater control of personal data. Recent legal reforms have attempted to limit the risks to freedom of association and expression associated with electronic surveillance. This book looks at the background to recent reforms and explains how courts and the legislature are attempting to effect a balance between security and personal liberty within a social contract. It asks what drives public concern when other aspects seem to be less contentious. In view of our apparent willingness to post on social media and engage in online commerce, it considers if we are truly consenting to a loss of privacy and how this reconciles with concerns about state surveillance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Seven Deadliest Web Application Attacks
Mike Shema Paperback R577 Discovery Miles 5 770
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650
Masters of Deception - The Worldwide…
Louis R. Mizell Hardcover R673 Discovery Miles 6 730
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
Managing Catastrophic Loss of Sensitive…
Constantine Photopoulos Paperback R1,265 Discovery Miles 12 650
CEH Certified Ethical Hacker Bundle…
Matt Walker Mixed media product R1,030 Discovery Miles 10 300
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda Paperback R1,208 Discovery Miles 12 080
Advanced Persistent Threat…
Eric Cole Paperback R1,111 Discovery Miles 11 110
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,233 Discovery Miles 22 330

 

Partners