|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
As economies globalize, the number and power of transnational
companies increases, especially in developing countries. Relevant,
reliable, and comparable financial information and a common
business language are needed to ensure communication between all
users of financial information. Throughput Accounting in a
Hyperconnected World provides innovative insights into
controversial debates regarding the configuration and use of
accounting and finance information both internally within economic
entities and through third parties. These debates underline the
major responsibility of users when configuring accounting and
finance models and thereby in modelling business information. The
content within this publication covers risk analysis, social
accounting, and entrepreneurial models and is designed for
managers, accountants, risk managers, academics, researchers,
practitioners, and students.
Audio Content Security: Attack Analysis on Audio Watermarking
describes research using a common audio watermarking method for
four different genres of music, also providing the results of many
test attacks to determine the robustness of the watermarking in the
face of those attacks. The results of this study can be used for
further studies and to establish the need to have a particular way
of audio watermarking for each particular group of songs, each with
different characteristics. An additional aspect of this study tests
and analyzes two parameters of audio host file and watermark on a
specific evaluation method (PSNR) for audio watermarking.
Web penetration testing by becoming an ethical hacker. Protect the
web by learning the tools, and the tricks of the web application
attacker. Key Features Builds on books and courses on penetration
testing for beginners Covers both attack and defense perspectives
Examines which tool to deploy to suit different applications and
situations Book DescriptionBecoming the Hacker will teach you how
to approach web penetration testing with an attacker's mindset.
While testing web applications for performance is common, the
ever-changing threat landscape makes security testing much more
difficult for the defender. There are many web application tools
that claim to provide a complete survey and defense against
potential threats, but they must be analyzed in line with the
security needs of each web application or service. We must
understand how an attacker approaches a web application and the
implications of breaching its defenses. Through the first part of
the book, Adrian Pruteanu walks you through commonly encountered
vulnerabilities and how to take advantage of them to achieve your
goal. The latter part of the book shifts gears and puts the newly
learned techniques into practice, going over scenarios where the
target may be a popular content management system or a
containerized application and its network. Becoming the Hacker is a
clear guide to web application security from an attacker's point of
view, from which both sides can benefit. What you will learn Study
the mindset of an attacker Adopt defensive strategies Classify and
plan for standard web application security threats Prepare to
combat standard system security problems Defend WordPress and
mobile applications Use security tools and plan for defense against
remote execution Who this book is forThe reader should have basic
security experience, for example, through running a network or
encountering security issues during application development. Formal
education in security is useful, but not required. This title is
suitable for people with at least two years of experience in
development, network management, or DevOps, or with an established
interest in security.
This book provides a comprehensive study of the state of the art in
location privacy for mobile applications. It presents an integrated
five-part framework for location privacy research, which includes
the analysis of location privacy definitions, attacks and
adversaries, location privacy protection methods, location privacy
metrics, and location-based mobile applications. In addition, it
analyses the relationships between the various elements of location
privacy, and elaborates on real-world attacks in a specific
application. Furthermore, the book features case studies of three
applications and shares valuable insights into future research
directions. Shedding new light on key research issues in location
privacy and promoting the advance and development of future
location-based mobile applications, it will be of interest to a
broad readership, from students to researchers and engineers in the
field.
Improve information security by learning Social Engineering. Key
Features Learn to implement information security using social
engineering Get hands-on experience of using different tools such
as Kali Linux, the Social Engineering toolkit and so on Practical
approach towards learning social engineering, for IT security Book
DescriptionThis book will provide you with a holistic understanding
of social engineering. It will help you to avoid and combat social
engineering attacks by giving you a detailed insight into how a
social engineer operates. Learn Social Engineering starts by giving
you a grounding in the different types of social engineering
attacks,and the damages they cause. It then sets up the lab
environment to use different toolS and then perform social
engineering steps such as information gathering. The book covers
topics from baiting, phishing, and spear phishing, to pretexting
and scareware. By the end of the book, you will be in a position to
protect yourself and your systems from social engineering threats
and attacks. All in all, the book covers social engineering from A
to Z , along with excerpts from many world wide known security
experts. What you will learn Learn to implement information
security using social engineering Learn social engineering for IT
security Understand the role of social media in social engineering
Get acquainted with Practical Human hacking skills Learn to think
like a social engineer Learn to beat a social engineer Who this
book is forThis book targets security professionals, security
analysts, penetration testers, or any stakeholder working with
information security who wants to learn how to use social
engineering techniques. Prior knowledge of Kali Linux is an added
advantage
Detailed walkthroughs of how to discover, test, and document common
web application vulnerabilities. Key Features Learn how to test for
common bugs Discover tools and methods for hacking ethically
Practice working through pentesting engagements step-by-step Book
DescriptionBug bounties have quickly become a critical part of the
security economy. This book shows you how technical professionals
with an interest in security can begin productively-and
profitably-participating in bug bounty programs. You will learn
about SQli, NoSQLi, XSS, XXE, and other forms of code injection.
You'll see how to create CSRF PoC HTML snippets, how to discover
hidden content (and what to do with it once it's found), and how to
create the tools for automated pentesting workflows. Then, you'll
format all of this information within the context of a bug report
that will have the greatest chance of earning you cash. With
detailed walkthroughs that cover discovering, testing, and
reporting vulnerabilities, this book is ideal for aspiring security
professionals. You should come away from this work with the skills
you need to not only find the bugs you're looking for, but also the
best bug bounty programs to participate in, and how to grow your
skills moving forward in freelance security research. What you will
learn Choose what bug bounty programs to engage in Understand how
to minimize your legal liability and hunt for bugs ethically See
how to take notes that will make compiling your submission report
easier Know how to take an XSS vulnerability from discovery to
verification, and report submission Automate CSRF PoC generation
with Python Leverage Burp Suite for CSRF detection Use WP Scan and
other tools to find vulnerabilities in WordPress, Django, and Ruby
on Rails applications Write your report in a way that will earn you
the maximum amount of money Who this book is forThis book is
written for developers, hobbyists, pentesters, and anyone with an
interest (and a little experience) in web application security.
|
You may like...
On Thin Ice
Leading Cybersecurity Experts
Hardcover
R680
Discovery Miles 6 800
|