Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 20 of 20 matches in All Departments
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
Social networks, particularly public ones, have become part of
the fabric of how we communicate and collaborate as a society. With
value from micro-level personal networking to macro-level outreach,
social networking has become pervasive in people s lives and is now
becoming a significant driving force in business. These new
platforms have provided new approaches to many critical enterprise
functions, including identifying, communicating, and gathering
feedback with customers (e.g., Facebook, Ning); locating expertise
(e.g., LinkedIn); providing new communication platforms (e.g.,
Twitter); and collaborating with a community, small or large (e.g.,
wikis). However, many organizations have stayed away from potential
benefits of social networks because of the significant risks
associated with them. This book will help an organization
understand the risks present in social networks and provide a
framework covering policy, training and technology to address those
concerns and mitigate the risks presented to leverage social media
in their organization. The book also acknowledges that many
organizations have already exposed themselves to more risk than
they think from social networking and offers strategies for
"dialing it back" to retake control.
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
Enter the other night life of Las Vegas. Away form the bright lights of the Strip are the subdued spot lights that cast onto stages for the exotic dancers. It is a reality for the women who work it and men seeking pleasure. There is one man who does not agree with the lifestyle the women are leading. The game of tease and sex can lead to sudden death. It is Byron who is more than happy to take them to their grave. Tom Beckley, twenty year veteran of Metro, finds himself involved in the case and stumbles onto something no one has ever seen before.
Over 75% of network attacks are targeted at the web application
layer. This book provides explicit hacks, tutorials, penetration
tests, and step-by-step demonstrations for security professionals
and Web application developers to defend their most vulnerable
applications. * The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book (http: //www.elsevierdirect.com/v2/companion.jsp?ISBN=9781597490610)
CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major update with more focus on security and wireless aspects of networking. Our new study guide has been updated accordingly with focus on network, systems, and WAN security and complete coverage of today's wireless networking standards. As always this companion covers the core Network+ material including basic design principles, management and operation of a network infrastructure, and testing tools. After reading this book not only will you be able to ace the exam but you will be able to maintain, troubleshoot, and install computer networks. New to this edition are: Intensified focus on network
securityTwo NEW practice exams to help eliminate test-day
jittersTiered chapter ending quesitons that allow gradual
learning
The book begins with real world cases of botnet attacks to
underscore the need for action. Next the book will explain botnet
fundamentals using real world examples. These chapters will cover
what they are, how they operate, and the environment and technology
that makes them possible. The following chapters will analyze
botnets for opportunities to detect, track, and remove them. Then
the book will describe intelligence gathering efforts and results
obtained to date. Public domain tools like OurMon, developed by Jim
Binkley of Portland State University, will be described in detail
along with discussions of other tools and resources that are useful
in the fight against Botnets.
Windows 2003 Server is unquestionably the dominant enterprise level
operating system in the industry, with 95% of all companies running
it. And for the last tow years, over 50% of all product upgrades
have been security related. Securing Windows Server, according to
bill gates, is the company's #1 priority.
Many exciting frontiers of science and engineering require understanding the spatiotemporal properties of sustained nonequilibrium systems such as fluids, plasmas, reacting and diffusing chemicals, crystals solidifying from a melt, heart muscle, and networks of excitable neurons in brains. This introductory textbook for graduate students in biology, chemistry, engineering, mathematics, and physics provides a systematic account of the basic science common to these diverse areas. This book provides a careful pedagogical motivation of key concepts, discusses why diverse nonequilibrium systems often show similar patterns and dynamics, and gives a balanced discussion of the role of experiments, simulation, and analytics. It contains numerous worked examples and over 150 exercises. This book will also interest scientists who want to learn about the experiments, simulations, and theory that explain how complex patterns form in sustained nonequilibrium systems.
|
You may like...
NIrV, Adventure Bible for Early Readers…
Lawrence O. Richards
Leather / fine binding
Digital Learning Anytime and Real Time…
Yonty Friesem, Renee Hobbs
Loose-leaf
R335
Discovery Miles 3 350
Digital Learning in Higher Education…
Matt Smith, John Traxler
Hardcover
R2,575
Discovery Miles 25 750
NIV, Adventure Bible, Leathersoft, Blue…
Lawrence O. Richards
Leather / fine binding
|