0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (11)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

Extremist Propaganda in Social Media - A Threat to Homeland Security (Paperback): Michael Erbschloe Extremist Propaganda in Social Media - A Threat to Homeland Security (Paperback)
Michael Erbschloe
R1,674 Discovery Miles 16 740 Ships in 12 - 17 working days

Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives. The book identifies the current phenomenon, what shall be dubbed for purposes of this book "Blisstopian Societies"-characterized in the abiding "ignorance is bliss" principle-whereby a population is complacent and has unquestioning acceptance of a social doctrine without challenge and introspection. In these subcultures, the malleable population self-select social media content, "news," and propaganda delivery mechanisms. By doing so, they expose themselves only to content that motivates, reinforces, and contributes to their isolation, alienation, and self-regulation of the social groups and individuals. In doing this, objective news is dismissed, fake-or news otherwise intended to misinform-reinforces their stereotyped beliefs about society and the world around them. This phenomenon is, unfortunately, not "fake news," but a real threat to which counterterror, intelligence, Homeland Security, law enforcement, the military, and global organizations must be hyper-vigilant of, now and into the foreseeable future. Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric. The book illustrates throughout that this contrived and manufactured bliss has fueled the rise and perpetuation of hate crimes, radicalism, and violence in such groups as ISIS, Boko Haram, Neo-Nazis, white separatists, and white supremacists in the United States-in addition to perpetuating ethnic cleansing actions around the world. This dynamic has led to increased political polarization in the United States and abroad, while furthering an unwillingness and inability to both compromise or see others' perspectives-further fomenting insular populations increasing willing to harm others and do violence. Extremist Propaganda in Social Media relates current Blisstopian practices to real-world hate speech and violence, connecting how such information is consumed by groups and translated into violent action. The book is an invaluable resources for those professionals that require an awareness of social media radicalization including: social media strategists, law enforcement, Homeland Security professionals, military planners and operatives-anyone tasked with countering combat such violent factions and fringes in conflict situations.

Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback): Michael Erbschloe Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback)
Michael Erbschloe
R1,339 Discovery Miles 13 390 Ships in 12 - 17 working days

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

Social Media Warfare - Equal Weapons for All (Paperback): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Paperback)
Michael Erbschloe
R1,343 Discovery Miles 13 430 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Social Engineering - Hacking Systems, Nations, and Societies (Paperback): Michael Erbschloe Social Engineering - Hacking Systems, Nations, and Societies (Paperback)
Michael Erbschloe
R1,318 Discovery Miles 13 180 Ships in 12 - 17 working days

This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, you'll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security.

Extremist Propaganda in Social Media - A Threat to Homeland Security (Hardcover): Michael Erbschloe Extremist Propaganda in Social Media - A Threat to Homeland Security (Hardcover)
Michael Erbschloe
R3,977 Discovery Miles 39 770 Ships in 12 - 17 working days

Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives. The book identifies the current phenomenon, what shall be dubbed for purposes of this book "Blisstopian Societies"-characterized in the abiding "ignorance is bliss" principle-whereby a population is complacent and has unquestioning acceptance of a social doctrine without challenge and introspection. In these subcultures, the malleable population self-select social media content, "news," and propaganda delivery mechanisms. By doing so, they expose themselves only to content that motivates, reinforces, and contributes to their isolation, alienation, and self-regulation of the social groups and individuals. In doing this, objective news is dismissed, fake-or news otherwise intended to misinform-reinforces their stereotyped beliefs about society and the world around them. This phenomenon is, unfortunately, not "fake news," but a real threat to which counterterror, intelligence, Homeland Security, law enforcement, the military, and global organizations must be hyper-vigilant of, now and into the foreseeable future. Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric. The book illustrates throughout that this contrived and manufactured bliss has fueled the rise and perpetuation of hate crimes, radicalism, and violence in such groups as ISIS, Boko Haram, Neo-Nazis, white separatists, and white supremacists in the United States-in addition to perpetuating ethnic cleansing actions around the world. This dynamic has led to increased political polarization in the United States and abroad, while furthering an unwillingness and inability to both compromise or see others' perspectives-further fomenting insular populations increasing willing to harm others and do violence. Extremist Propaganda in Social Media relates current Blisstopian practices to real-world hate speech and violence, connecting how such information is consumed by groups and translated into violent action. The book is an invaluable resources for those professionals that require an awareness of social media radicalization including: social media strategists, law enforcement, Homeland Security professionals, military planners and operatives-anyone tasked with countering combat such violent factions and fringes in conflict situations.

Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Hardcover): Michael Erbschloe Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Hardcover)
Michael Erbschloe
R2,127 Discovery Miles 21 270 Ships in 12 - 17 working days

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,270 R1,192 Discovery Miles 11 920 Save R78 (6%) Ships in 12 - 17 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Physical Security for IT (Paperback): Michael Erbschloe Physical Security for IT (Paperback)
Michael Erbschloe
R2,187 Discovery Miles 21 870 Ships in 10 - 15 working days

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.
Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.
* Expert advice on identifying physical security needs
* Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems
* Explanation of the processes for establishing a physical IT security function
* Step-by-step instructions on how to accomplish physical security objectives
* Illustrations of the major elements of a physical IT security plan
* Specific guidance on how to develop and document physical security methods and procedures

Implementing Homeland Security for Enterprise IT (Paperback, New): Michael Erbschloe Implementing Homeland Security for Enterprise IT (Paperback, New)
Michael Erbschloe
R2,163 Discovery Miles 21 630 Ships in 10 - 15 working days

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001.
The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice.
*A one-minute manager approach to issuesp provides background and explanations in all areas
*Step-by-step instructions on how to accomplish objectives guide readers through processes
*Easy to implement advice allows readers to take quick action

Socially Responsible IT Management (Paperback): Michael Erbschloe Socially Responsible IT Management (Paperback)
Michael Erbschloe
R2,180 Discovery Miles 21 800 Ships in 10 - 15 working days

Socially Responsible IT Management shows IT professionals how to overcome the social crisis that has resulted from the wide-spread use of information technology. By responsibly managing security threats, protecting individual privacy, reducing hazardous waste, and minimizing other negative effects on IT staff and computer users, as well as ordinary citizens around the world, IT professionals can benefit the society at large and reap rewards for their own organizations as well.
Scandals at Enron, Andersen, Sotheby's and Christie's, Merrill Lynch, and Tyco are fueling a crisis of confidence in business. Regulators, voters, investors, customers, and employees are demanding that businesses be more socially responsible. Rhetoric is not enough, all organizations need to demonstrate that they are living up to social expectations. Erbschloe shows managers how to take charge of key aspects of their IT operations and follow a morally, ethically, and legally correct path to success.
. Supported by author speaking tour and "Computer Economics" website, www.computereconomics.com
. Step-by-step instructions on how to accomplish objectives of privacy and security
. Explains principles of ergonomics, energy efficiency, and recycling that can bring return on investment"

Social Media Warfare - Equal Weapons for All (Hardcover): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Hardcover)
Michael Erbschloe
R1,831 Discovery Miles 18 310 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Walling Out the Insiders - Controlling Access to Improve Organizational Security (Paperback): Michael Erbschloe Walling Out the Insiders - Controlling Access to Improve Organizational Security (Paperback)
Michael Erbschloe
R2,114 Discovery Miles 21 140 Ships in 12 - 17 working days

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
ShooAway Fly Repellent Fan (Black)
 (6)
R299 R259 Discovery Miles 2 590
Shield Engine Cleaner - Solvent Based…
R49 R45 Discovery Miles 450
Man In Die Maan
Etienne Fourie Paperback R315 R271 Discovery Miles 2 710
Anamino Beef Protein (250g)
R289 R189 Discovery Miles 1 890
Folding Table (Black) (1.8m)
R1,299 R619 Discovery Miles 6 190
Superstar Customer Service - 200…
Basil O'Hagan Paperback R123 Discovery Miles 1 230
Dog's Life Ballistic Nylon Waterproof…
R999 R808 Discovery Miles 8 080
Bestway Alpaca Swim Ring (1.13m x 1.09m)
R190 R119 Discovery Miles 1 190
Vital BabyŽ NURTURE™ Breast-Like Feeding…
R259 Discovery Miles 2 590
Tenet
John David Washington, Robert Pattinson Blu-ray disc  (1)
R52 R44 Discovery Miles 440

 

Partners