![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.
'Complex Worlds: Digital Culture, Rhetoric, and Professional Communication' is a collection of thought-provoking scholarly essays by teachers and industry practitioners in professional communication and technology-oriented fields. Scrupulously edited for a range of readers, the collection aims to help familiarize advanced students, teachers, and researchers in professional communication, computers and writing, literacy, and sister disciplines with key issues in digital theory and practice. An emphasis on the situations of and audiences for digital communication identifies 'Complex Worlds' as a rhetorical approach. In an era when globalizing markets and digital technologies are transforming culture around the world, readers should find the collection both engaging and timely. The collections' twelve essays constitute a diverse and thematically coherent set of inquiries. Included are explorations of topics such as cyber activism, digital 'dispositio', citizen and open-source journalism, broadband affordances, XML, digital resumes, avant garde performance art, best pedagogical practices, and intercultural communication between East and West, North and South. The text is especially well suited for advanced courses in professional and applied writing, contemporary rhetorics, and digital culture. The complexity highlighted in the collection's title is brought into relief by authors who address how the digital is daily unmaking our assumptions about the boundaries between work and school, the global and the local, the private and the public. 'Complex Worlds' offers readers an opportunity to build on their rhetorical awareness by expanding their understanding of the means, aims, and strategies of effective communication--today and in the future.
The book provides a compilation of idiosyncratic manifestations of information society in techno-economic, political and cultural spheres. The contributors focus on the increasing complexity within information societies. To manage this complexity, societies develop constantly evolving context-specific modes of meta-governance. The contributions allow a better understanding of well-known conceptualizations and definitions of information society and related concepts such as post-industrial society, post-modernity, as well as network society, and knowledge society.
Modern technological development has been both rapid and fundamentally transformative of the means and methods of warfare, and of the broader environment in which warfare is conducted. In many cases, technological development has been stimulated by, and dedicated to, addressing military requirements. On other occasions, technological developments outside the military sphere affect or inform the conduct of warfare and military expectations. The introduction of new technologies such as information technology, space technologies, nanotechnology and robotic technologies into our civil life, and into warfare, is expected to influence the application and interpretation of the existing rules of the law of armed conflict. In this book, scholars and practitioners working in the fields critically examine the potential legal challenges arising from the use of new technologies and future directions of legal development in light of the specific characteristics and challenges each technology presents with regard to foreseeable humanitarian impacts upon the battlespace.
Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids. Offering an accessible treatment of the latest research, this book: Presents specific wireless multimedia communication schemes that have proven to be useful Discusses important standardization processing activities regarding wireless networking Includes wireless mesh and multimedia sensor network architectures, protocols, and design optimizations Highlights the challenges associated with meeting complex connectivity requirements Contains numerous figures, tables, examples, references, and a glossary of acronyms Providing coverage of significant technological advances in their initial steps along with a survey of the fundamental principles and practices, Wireless Multimedia Communication Systems: Design, Analysis, and Implementation aids senior-level and graduate-level engineering students and practicing professionals in understanding the processes and furthering the development of today's wireless multimedia communication systems.
Deviance is both socially defined and influenced. While it is widely accepted that deviance is a social construction, this research revisits the conceptualization of deviance and advances the methods used to study deviance and social construction. This book presents and compares three methods for conceptualizing deviance within and across cultures. Comparing the United States to South Korea, perceptions of deviance are presented as how individuals define deviance and what acts are cited as deviant. Next, attribute data are used to assess differences in of conceptualizations of deviance by demographic factors. Finally, social network analysis is used to understand the social influences at work in how one perceives deviance. This book is unique in its reconceptualization of deviance and the application of social network analysis as a new tool for studying social influence and perceptions.
A vital toolkit for managing the news cycle and finding a happier and calmer life at a time when the news is more upsetting than ever STOP READING THE NEWS is a vital toolkit for managing the upsetting coronavirus news cycle and finding equilibrium and calm at a time of chaos and uncertainty In 2013 Rolf Dobelli stood in front of a roomful of journalists and proclaimed that he did not read the news. It caused a riot. Now the author of the bestselling The Art of Thinking Clearly finally sets down his philosophy in detail. And he practises what he preaches: he hasn't read the news for a decade. Stop Reading the News is Dobelli's manifesto about the dangers of the most toxic form of information - news. He shows the damage it does to our concentration and well-being, and how a misplaced sense of duty can misdirect our behaviour. Most importantly, he offers the reader the guidance on how to live without news, and the many potential gains to be had: less disruption, more time, less anxiety, more insights. In a world of increasing disruption and division, Stop Reading the News is a welcome voice of calm and wisdom.
Does it sometimes seem that everyone else is doing 'smarter' things on their smartphones than you? Do you feel you're not taking full advantage of some of the amazing technology available today, or perhaps just don't know that it even exists? Martin Bailey's latest book aims to solve life's little problems, one gadget at a time. Including hardware tech, PC/Mac software and mobile apps, it's laid out in an easy-to-read, concise format with each item covering two pages. It's written in plain English too, with illustrations and links to where you can find out more information. Covering over 100 gadgets, whether you're looking to improve your golf game, fix your PC and fill it with free software, measure a room using your phone or even alter your state of mind without drink or drugs, The Useful Book of Gadgets, Gizmos & Apps has something for everyone.
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional techniques as well as novel systems that have been developed over the past few years. It presents new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Filled with comprehensive graphical and modular illustrations, the text covers applications of affective computing in biometrics, matching sketch to photograph, cryptography approaches in biometrics, biometrics alteration, heterogeneous biometrics, and age invariant biometrics. It also presents biometrics algorithms with novel feature extraction techniques, computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Containing the work of some of the world's most respected biometrics researchers, the book includes model question papers, mathematical notations, and exercises to reinforce understanding. Providing an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification, this is an essential reference for researchers, scholars, graduate students, engineers, practitioners, and developers in the field of biometrics and its related fields.
How do new media affect the question of social memory? Social memory is usually described as enacted through ritual, language, art, architecture, and institutions ? phenomena whose persistence over time and capacity for a shared storage of the past was set in contrast to fleeting individual memory. But the question of how social memory should be understood in an age of digital computing, instant updating, and interconnection in real time, is very much up in the air. The essays in this collection discuss the new technologies of memory from a variety of perspectives that explicitly investigate their impact on the very concept of the social. Contributors: David Berry, Ina Blom, Wolfgang Ernst, Matthew Fuller, Andrew Goffey, Liv Hausken, Yuk Hui, Trond Lundemo, Adrian Mackenzie, Sonia Matos, Richard Mills, Jussi Parikka, Eivind Rossaak, Stuart Sharples, Tiziana Terranova, Pasi Valiaho.
There is much excitement about Web 2.0 as an unprecedented, novel, community-building space for experiencing, producing, and consuming leisure, particularly through social network sites. What is needed is a perspective that is invested in neither a utopian or dystopian posture but sees historical continuity to this cyberleisure geography. This book investigates the digital public sphere by drawing parallels to another leisure space that shares its rhetoric of being open, democratic, and free for all: the urban park. It makes the case that the history and politics of public parks as an urban commons provides fresh insight into contemporary debates on corporatization, democratization and privatization of the digital commons. This book takes the reader on a metaphorical journey through multiple forms of public parks such as Protest Parks, Walled Gardens, Corporate Parks, Fantasy Parks, and Global Parks, addressing issues such as virtual activism, online privacy/surveillance, digital labor, branding, and globalization of digital networks. Ranging from the 19th century British factory garden to Tokyo Disneyland, this book offers numerous spatial metaphors to bring to life aspects of new media spaces. Readers looking for an interdisciplinary, historical and spatial approach to staid Web 2.0 discourses will undoubtedly benefit from this text.
For outdoor adventurers who hike, fish, kayak, cross-country ski, or mountain bike in the backcountry, a GPS receiver can help them reach their destination and return safely -- but only if they know how to use it! Here is the guide to getting the most out of a GPS receiver, from basic consumer advice to advanced techniques. It even includes fun solo and team games that utilize GPS. Starting with essential definitions and moving on to creating waypoints, and using your GPS with a computer, this succinct book teaches the basics of navigation and outdoor GPS use. Advanced techniques are covered, such as creating custom maps, and new technologies are discussed, including using GPS-enabled mobile phones, and how to use GPS with Google Earth and Google Maps. With years of experience as a GPS instructor, Hinch is well-versed in all aspects of navigation and GPS use, and he covers them in a jargon-free, easy-to-follow style.
"Facebook and Philosophy" is an entertaining, multi-faceted exploration of what Facebook means for us and for our relationships. With discussions ranging from the nature of friendship and its relationship to "friending," to the (debatable) efficacy of "online activism," this book is the most extensive and systematic attempt to understand Facebook yet. And with plenty of new perspectives on Twitter and Web 2.0 along the way, this fun, thought-provoking book is a serious and significant contribution for anyone working with social media, whether in academia, journalism, public relations, activism, or business. Exploring far-reaching questions -- Can our interactions on Facebook help us care about each other more? Does Facebook signal the death of privacy, or (perhaps worse yet) the death of our desire for privacy? -- "Facebook and Philosophy" is vital reading for anyone involved in social networks today.
Focused on the mathematical foundations of social media analysis, Graph-Based Social Media Analysis provides a comprehensive introduction to the use of graph analysis in the study of social and digital media. It addresses an important scientific and technological challenge, namely the confluence of graph analysis and network theory with linear algebra, digital media, machine learning, big data analysis, and signal processing. Supplying an overview of graph-based social media analysis, the book provides readers with a clear understanding of social media structure. It uses graph theory, particularly the algebraic description and analysis of graphs, in social media studies. The book emphasizes the big data aspects of social and digital media. It presents various approaches to storing vast amounts of data online and retrieving that data in real-time. It demystifies complex social media phenomena, such as information diffusion, marketing and recommendation systems in social media, and evolving systems. It also covers emerging trends, such as big data analysis and social media evolution. Describing how to conduct proper analysis of the social and digital media markets, the book provides insights into processing, storing, and visualizing big social media data and social graphs. It includes coverage of graphs in social and digital media, graph and hyper-graph fundamentals, mathematical foundations coming from linear algebra, algebraic graph analysis, graph clustering, community detection, graph matching, web search based on ranking, label propagation and diffusion in social media, graph-based pattern recognition and machine learning, graph-based pattern classification and dimensionality reduction, and much more. This book is an ideal reference for scientists and engineers working in social media and digital media production and distribution. It is also suitable for use as a textbook in undergraduate or graduate courses on digital media, social media, or social networks.
This text is a companion to the 2nd edition of Intellectual Property Law And New Media: Free for a Fee. Moving the coverage of case analysis to this separate volume, enables the authors to focus their attention on important trial and legal procedures that apply extant law to, largely, new circumstances. Readers can focus on history and concepts while reading the main text, allowing them to bring understandings derived there to bear on the cases found in this analytic text. The approach offers relief from information overload and allows time and space to "shift gears" between concepts and cases. To aid understanding and learning, the authors provide focused interpretations and analysis throughout. The coverage allows these books to serve as an excellent resource for undergraduates studying interactive media, as well as being a primer for first year IP law students, a handbook for entrepreneurs, a guidebook for general lawyers to assist in referrals, and an interesting read for those simply curious about the field. The books are supplemented by freeforafee.com, a blog providing textual updates, online links to bibliographic materials, and extensive resource aggregation. Learning objectives for each chapter and a glossary of key terms are provided within the texts.
'A cold, hungry adventure story about the power of choice and the strength of solidarity' SEAN MICHAELS America, 2049: Summer temperatures are intolerably high, the fossil fuel industry has shut down, and humans are implanted with a 'Flick' at birth, which allows them to remain perpetually online. The wealthy live in the newly created Floating City off the coast, while people on the mainland struggle to get by. For Rose, a job as a hostess in the city's elite club feels like her best hope for a better future. At a Cold War-era research station, a group of highly trained women with the code name White Alice are engaged in climate surveillance. But the terms of their employment become increasingly uncertain. And in a former oil town in northern Canada called Dominion Lake, a camp is being built-Camp Zero. A rare source of fresh, clean air and cooler temperatures, it will be the beginning of a new community and a new way of life. Grant believes it will be the perfect place to atone for his family's dark legacy. Everyone has an agenda. So who can you trust? Could falling in love be most the radical act of all? Thrilling, immersive and disturbingly prescient, Camp Zero is about the world we've built and where we go from here. |
You may like...
Winning on Purpose - The Unbeatable…
Fred Reichheld, Darci Darnell, …
Hardcover
R588
Discovery Miles 5 880
|