![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your
Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist theory, social learning theory, and postmodernism, this text paves the way for those who seek to tackle the most pertinent areas in technocrime. Technocrime and Criminological Theory challenges readers to confront the conflicts, gaps, and questions faced by both scholars and practitioners in the field. This book serves as an ideal primer for scholars beginning to study technocrime or as a companion for graduate level courses in technocrime or deviance studies.
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam. The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.
Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits
Some have estimated that healthcare fraud in the United States results in losses of approximately $80 billion a year. Although there are many books available that describe how to "detect" healthcare fraud, few address what must be done after the fraud is detected. Filling this need, Charles Piper's Healthcare Fraud Investigation Guidebook details not only how to detect healthcare fraud, but also how to "investigate" and prove the wrongdoing to increase the likelihood of successful prosecution in court.The book starts by covering the history of healthcare insurance and the various types of fraud schemes. It presents Charles Piper's unique approach to investigating (The Piper Method) which allows readers to conduct as many as 10 simultaneous investigations for each case. It emphasizes the importance of simultaneously searching for waste and abuse as well as systemic weaknesses and deficiencies that caused or contributed to the problem or wrongdoing under investigation and then make recommendations for improvement. It also provides: Questions to ask whistleblowers, complainants, employers, employees, and healthcare providers who are suspects Tips on investigative case planning, goals, and strategies Sample visual aids for use when briefing others about your investigative findings Guidance on presenting information obtained from healthcare investigations and on how to testify in court Techniques for uncovering previously undetected fraud The book includes a sample case study that walks readers through a mock case from the time the case is received through the end. The case study demonstrates how to initiate, plan, and conduct a thorough and complete healthcare fraud investigation while incorporating Piper's proven methodology.Sharing insights gained through Charles Piper's decades of experience as a federal special agent and certified fraud examiner, th
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.
How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security Needs The book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems, response force models, and practical considerations for protecting information technology (IT). Addresses general safety concerns and specific issues covered by Occupational Safety and Health Administration (OSHA) and fire protection regulations Discusses security policies and procedures required for implementing a system and developing an attitude of effective physical security Acts as a handbook for security applications and as a reference of security considerations Physical Security and Safety: A Field Guide for the Practitioner offers relevant discourse on physical security in the workplace, and provides a guide for security, risk management, and safety professionals.
This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.
As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines: The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websites Forms of criminal behavior that can be performed utilizing social networking websites Criminality via texting, identity theft, and hacking Adolescents as offenders and victims in cyberbullying and digital piracy Online sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcement's response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.
New technologies are often implemented before their ethical consequences have been fully understood. In this volume, experts working in the sciences, arts, and philosophy of technology share novel perspectives on how we can best identify and navigate the new ethical crossroads emerging in our information society. With an eye toward the future, the contributors present an essential and unique view on the interplay between ethics and modern technology.
This book assesses the normative and practical challenges for artificial intelligence (AI) regulation, offers comprehensive information on the laws that currently shape or restrict the design or use of AI, and develops policy recommendations for those areas in which regulation is most urgently needed. By gathering contributions from scholars who are experts in their respective fields of legal research, it demonstrates that AI regulation is not a specialized sub-discipline, but affects the entire legal system and thus concerns all lawyers. Machine learning-based technology, which lies at the heart of what is commonly referred to as AI, is increasingly being employed to make policy and business decisions with broad social impacts, and therefore runs the risk of causing wide-scale damage. At the same time, AI technology is becoming more and more complex and difficult to understand, making it harder to determine whether or not it is being used in accordance with the law. In light of this situation, even tech enthusiasts are calling for stricter regulation of AI. Legislators, too, are stepping in and have begun to pass AI laws, including the prohibition of automated decision-making systems in Article 22 of the General Data Protection Regulation, the New York City AI transparency bill, and the 2017 amendments to the German Cartel Act and German Administrative Procedure Act. While the belief that something needs to be done is widely shared, there is far less clarity about what exactly can or should be done, or what effective regulation might look like. The book is divided into two major parts, the first of which focuses on features common to most AI systems, and explores how they relate to the legal framework for data-driven technologies, which already exists in the form of (national and supra-national) constitutional law, EU data protection and competition law, and anti-discrimination law. In the second part, the book examines in detail a number of relevant sectors in which AI is increasingly shaping decision-making processes, ranging from the notorious social media and the legal, financial and healthcare industries, to fields like law enforcement and tax law, in which we can observe how regulation by AI is becoming a reality.
Disinformation is as old as humanity. When Satan told Eve nothing would happen if she bit the apple, that was disinformation. But the rise of social media has made disinformation even more pervasive and pernicious in our current era. In a disturbing turn of events, governments are increasingly using disinformation to create their own false narratives, and democracies are proving not to be very good at fighting it. During the final three years of the Obama administration, Richard Stengel, the former editor of Time and an Under Secretary of State, was on the front lines of this new global information war. At the time, he was the single person in government tasked with unpacking, disproving, and combating both ISIS's messaging and Russian disinformation. Then, in 2016, as the presidential election unfolded, Stengel watched as Donald Trump used disinformation himself, weaponizing the grievances of Americans who felt left out by modernism. In fact, Stengel quickly came to see how all three players had used the same playbook: ISIS sought to make Islam great again; Putin tried to make Russia great again; and we all know about Trump. In a narrative that is by turns dramatic and eye-opening, Information Wars walks readers through of this often frustrating battle. Stengel moves through Russia and Ukraine, Saudi Arabia and Iraq, and introduces characters from Putin to Hillary Clinton, John Kerry and Mohamed bin Salman to show how disinformation is impacting our global society. He illustrates how ISIS terrorized the world using social media, and how the Russians launched a tsunami of disinformation around the annexation of Crimea - a scheme that became the model for their interference with the 2016 presidential election. An urgent book for our times, Information Wars stresses that we must find a way to combat this ever growing threat to democracy.
Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.
What happens when the internet is absorbed into everyday life? How do we make sense of something that is invisible but still so central? A group of digital culture experts address these questions in Metaphors of Internet: Ways of Being in the Age of Ubiquity. Twenty years ago, the internet was imagined as standing apart from humans. Metaphorically it was a frontier to explore, a virtual world to experiment in, an ultra-high-speed information superhighway. Many popular metaphors have fallen out of use, while new ones arise all the time. Today we speak of data lakes, clouds and AI. The essays and artwork in this book evoke the mundane, the visceral, and the transformative potential of the internet by exploring the currently dominant metaphors. Together they tell a story of kaleidoscopic diversity of how we experience the internet, offering a richly textured glimpse of how the internet has both disappeared and at the same time, has fundamentally transformed everyday social customs, work, and life, death, politics, and embodiment.
Vintage Game Consoles tells the story of the most influential videogame platforms of all time, including the Apple II, Commodore 64, Nintendo Entertainment System, Game Boy, Sega Genesis, Sony PlayStation, and many more. It uncovers the details behind the consoles, computers, handhelds, and arcade machines that made videogames possible. Drawing on extensive research and the authors' own lifelong experience with videogames, Vintage Game Consoles explores each system's development, history, fan community, its most important games, and information for collectors and emulation enthusiasts. It also features hundreds of exclusive full-color screenshots and images that help bring each system's unique story to life. Vintage Game Consoles is the ideal book for gamers, students, and professionals who want to know the story behind their favorite computers, handhelds, and consoles, without forgetting about why they play in the first place - the fun
Effective administration of government and governmental organizations is a crucial part of achieving success in those organizations. With the widespread knowledge and use of e-government, the intent and evaluation of its services continue to focus on meeting the needs and satisfaction of its citizens. Strategic Management and Innovative Applications of E-Government is a pivotal reference source that provides organizational and managerial directions, applications, and theoretical and philosophical discussions on current issues relating to the practice of electronic government. While highlighting topics such as citizen trust in government and smart government, this publication explores electronic government technology adoption, as well as the methods of government social media practices. This book is a vital reference source for policy makers, IT specialists, government professionals, academicians, researchers, and graduate-level students seeking current research on e-government applications.
"If you only read one book in your life, it probably shouldn't be this one. However, if you're not operating an inexplicable one-book policy, these stories are funny, touching, and more than worth your time." - John Oliver "Josh Gondelman is one of the most original hilarious voices out there today. This book will hook you and make you laugh and laugh." - Amy Schumer Emmy-Award winning writer and comedian Josh Gondelman's collection of personal stories of best intentions and mixed results. Josh Gondelman knows a thing or two about trying-and failing. The Emmy Award-winning stand-up comic-dubbed a "pathological sweetheart" by the New York Observer-is known throughout the industry as one of comedy's true "nice guys." Not surprisingly, he's endured his share of last-place finishes. But he keeps on bouncing back. In this collection of hilarious and poignant essays (including his acclaimed New York Times piece "What if I Bombed at My Own Wedding?"), Josh celebrates a life of good intentions-and mixed results. His true tales of romantic calamities, professional misfortunes, and eventual triumphs reinforce the notion: we get out of the world what we put into it. Whether he's adopting a dog from a suspicious stranger, mitigating a disastrous road trip, or trying MDMA for the first (and only) time, Josh only wants the best for everyone-even as his attempts to do the right thing occasionally implode. Full of the warm and relatable humor that's made him a favorite on the comedy club circuit, Nice Try solidifies Josh Gondelman's reputation as not just a good guy, but a skilled observer of the human condition.
Make LinkedIn your number one professional branding tool LinkedIn is the premiere social network for professionals looking to discover new opportunities, enhance personal branding, connect with other professionals, and make career advancements. With LinkedIn For Dummies, you'll have step-by-step instructions on how to take advantage of the latest tools and features to do all of this and more. This book will teach you how to create an attractive profile that employers will notice, as well as ways to expand your network by making connections around the globe. You'll also learn how to best navigate the new user interface, write recommendations, take a course with LinkedIn Learning, and conduct your job search. Create an appealing, detailed profile Establish your credibility and personal brand Connect with employers and find jobs Request and write recommendations Whether you're one of LinkedIn's 500 million global members or brand new to the site, this authoritative resource helps you get the most out of the world's largest professional network. |
You may like...
Research Anthology on Social Media's…
Information Resources Management Association
Hardcover
R9,426
Discovery Miles 94 260
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|