|
Showing 1 - 16 of
16 matches in All Departments
'I have a gift for you and Nancy.' She put her hand into her pocket
and pulled out two little plastic bags. There were two strings of
rosary beads, black and shiny like a line of beetles. All families
have secrets, but Bernadette's are more dangerous than most. On
holiday in Northern Ireland in 1982, she and her older sister
discover their family is involved with disappearances and murder.
Thirty years later Nancy makes a disastrous return to the farm with
her own family. The events of the past gradually and menacingly
reveal why those sisters have not spoken to each other since that
last disturbing summer together.
To counteract a cyber attacker, you need to learn to think like
one. This book explores the psychology of cyber warfare and how
organizations can thwart cyber attackers. Understand the Cyber
Attacker Mindset examines the various types of cyber attackers out
there and explores their motivations, including financial gain,
revenge and the desire for power and control. It examines the
methods used, such as social engineering and manipulation, and
discusses the challenges faced by law enforcement in tracking and
apprehending them. It provides a comprehensive look at the inner
workings of the cyber attacker mind in the digital age and
concludes with a set of strategies that organizations can deploy to
counteract them, including tactics on training people to identify
and resist manipulation. Written by a renowned cybersecurity
leader, the book draws on interviews with top experts in the field
in both public and private sectors to share rich insights and a
wide range of case studies profiling notable cyber crime incidents.
With continual technological advancements in cybersecurity, the
cyber crime industry is increasingly falling back to social
engineering and preying on people's vulnerabilities. The human side
of cybersecurity has never been so important.
When Shona's teenage daughter goes missing, she's certain her
ex-husband is the culprit. Her mother, Greta, is no help as she's
too obsessed with being chased by the devil. Her uncle, Jimmy, is
fresh out of prison and has never been entirely straight with her.
Then there's the shaman living in her shed. All Shona wants is a
simple life with her young son, and to get free of Maynard, the ex
who's still living in the house. But nothing is ever
straightforward and Shona soon discovers that the secrets she
buried are as dangerous as the family curse that haunts her mother.
Ted moves to London to become a journalist but quickly slides into
debt. Things look up when he is given the opportunity to go to
Romania to interview a film director and then attend the Moscow
film festival. But someone has other plans for him. Has he walked
into a trap?
When fourteen-year-old Allie's mother, Mae, mysteriously disappears
in the dark waters of the Sydney harbor, Allie must face the
secrets buried in the mud-rich landscape of Mae's childhood. Set
within Australia's lush rain forest at the height of the rainy
season, Salt Rain is an absorbing debut about sifting through the
complicated stories that shape us, and ultimately reclaiming them
as our own.
To counteract a cyber attacker, you need to learn to think like
one. This book explores the psychology of cyber warfare and how
organizations can thwart cyber attackers. Understand the Cyber
Attacker Mindset examines the various types of cyber attackers out
there and explores their motivations, including financial gain,
revenge and the desire for power and control. It examines the
methods used, such as social engineering and manipulation, and
discusses the challenges faced by law enforcement in tracking and
apprehending them. It provides a comprehensive look at the inner
workings of the cyber attacker mind in the digital age and
concludes with a set of strategies that organizations can deploy to
counteract them, including tactics on training people to identify
and resist manipulation. Written by a renowned cybersecurity
leader, the book draws on interviews with top experts in the field
in both public and private sectors to share rich insights and a
wide range of case studies profiling notable cyber crime incidents.
With continual technological advancements in cybersecurity, the
cyber crime industry is increasingly falling back to social
engineering and preying on people's vulnerabilities. The human side
of cybersecurity has never been so important.
Lead Fiction, Spring 2019: This thriller brilliantly evokes 1973
Moscow and a world of diplomacy and counter-espionage. Escaping
failure as an undergraduate and a daughter, not to mention bleak
1970s England, Martha marries Kit - who is gay. Having a wife could
keep him safe in Moscow in his diplomatic post. As Martha tries to
understand her new life and makes the wrong friends, she walks
straight into an underground world of counter-espionage. Out of her
depth, Martha no longer knows who can be trusted.
Lead Fiction, Spring 2019: This thriller brilliantly evokes 1973
Moscow and a world of diplomacy and counter-espionage. Escaping
failure as an undergraduate and a daughter, not to mention bleak
1970s England, Martha marries Kit - who is gay. Having a wife could
keep him safe in Moscow in his diplomatic post. As Martha tries to
understand her new life and makes the wrong friends, she walks
straight into an underground world of counter-espionage. Out of her
depth, Martha no longer knows who can be trusted.
The book offers an incisive collection of contemporary research
into the problems of crime control and punishment. It has three
inter-related aims: to take stock of current thinking on
punishment, regulation, and control in the early years of a new
century and in the wake of a number of critical junctures,
including 9/11, which have transformed the social, political, and
cultural environment; to present a selection of the diverse
epistemological and methodological frameworks which inform current
research; and finally to set out some fruitful directions for the
future study of punishment. The contributions to this collection
cover some of the most exciting and challenging areas of current
research including terrorism and the politics of fear, penality in
societies in transition, penal policy and the construction of
political identity, the impact of digital culture on modes of
compliance, the emergent hegemony of information and surveillance
systems, and the evolving politics of victimhood. Taken together,
this work draws connections between local problems of crime
control, transnational forms of governance, and the ways in which
certain political and jurisprudential discourses have come to
dominate policy and practice in western penal systems. ERRATUM The
sentence on p. 153, lines 5-7 should read "...if welfare
expenditure had not risen but remained at its 1987 level, the rise
in imprisonment would have been 20 per cent greater than actually
occurred, i.e. from 75 in 1987 to 99 in 1998." No other part of the
book is affected by this correction.
This collection presents a diverse set of case studies and
theoretical reflections on how criminologists engage with
practitioners and policy makers while undertaking research. The
contributions to this volume highlight both the challenges and
opportunities associated with doing criminological research in a
reflexive and collaborative manner. They further examine the
ethical and practical implications of the 'impact' agenda in the
higher education sector with respect to the production and the
dissemination of criminological knowledge. Developed to serve as an
internationally accessible reference volume for scholars,
practitioners and postgraduate criminology students, this book
responds to the awareness that criminology as a discipline
increasingly encompasses not only the study of crime, but also the
agencies, process and structures that regulate it. Key questions
include: How can criminal justice policy be studied as part of the
field of criminology? How do we account for our own roles as
researchers who are a part of the policy process? What factors and
dynamics influence, hinder and facilitate 'good policy'?
Authored by top anesthetists, this Second Edition of Primary FRCA
in a Box contains over 200 revision flashcards addressing almost
all the topics needed to pass the Primary FRCA. Broad and
wide-ranging subject areas are covered in easy-to-learn note
format, including physiology, pharmacology, physics, and clinical
measurement. The cards include key diagrams to aid understanding
and are easy to reproduce in the oral exam.The cards include key
diagrams to aid understanding and are easy to reproduce in the oral
exam. Using standard question formats from the Royal College exams,
Primary FRCA in a Box is an essential tool for effective revision
and preparation for the Primary FRCA exams. It also provides
essential revision for candidates studying for the Final FRCA exam
who wish to have a concise review of Primary FRCA topics. These
flashcards are recommended for all qualified and trainee
anaesthetists and their trainers, and related health professionals.
Secure your business in a post-pandemic world: Master digital risk
identification and defense Purchase of the print or Kindle book
includes a free PDF eBook Key Features Become well-versed with
sophisticated system-level security risks and the zero-trust
framework Learn about remote working risks, modern collaboration,
and securing the digital data estate Keep up with rapidly evolving
compliances and regulations and their impact on cyber risks Book
DescriptionWith the rapid pace of digital change today, especially
since the pandemic sped up digital transformation and technologies,
it has become more important than ever to be aware of the unknown
risks and the landscape of digital threats. This book highlights
various risks and shows how business-as-usual operations carried
out by unaware or targeted workers can lead your organization to a
regulatory or business risk, which can impact your organization's
reputation and balance sheet. This book is your guide to
identifying the topmost risks relevant to your business with a
clear roadmap of when to start the risk mitigation process and what
your next steps should be. With a focus on the new and emerging
risks that remote-working companies are experiencing across diverse
industries, you'll learn how to manage risks by taking advantage of
zero trust network architecture and the steps to be taken when
smart devices are compromised. Toward the end, you'll explore
various types of AI-powered machines and be ready to make your
business future-proof. In a nutshell, this book will direct you on
how to identify and mitigate risks that the ever- advancing digital
technology has unleashed. What you will learn Become aware of and
adopt the right approach to modern digital transformation Explore
digital risks across companies of all sizes Study real-world cases
that focus on post-pandemic digital transformation Understand
insider threats and how to mitigate vulnerability exploitation Get
to know how cyberwarfare targets infrastructure and disrupts
critical systems Discover how implementing a regulatory framework
can safeguard you in the current and future data landscapes Who
this book is forThis book is for three categories of
readers—those who own a business and are planning to scale it;
those who are leading business and technology charters in large
companies or institutions; and those who are academically or
disciplinarily targeting cybersecurity and risk management as a
practice-area. Essentially, this book is for board members, and
professionals working in IT, GRC, and legal domains. It will also
help technology leaders, including chief digital officers, chief
privacy officers, chief risk officers, CISOs, CIOs, as well as
students and cybersecurity enthusiasts with basic awareness of
risks to navigate the digital threat landscape.
The book offers an incisive collection of contemporary research
into the problems of crime control and punishment. It has three
inter-related aims: to take stock of current thinking on
punishment, regulation, and control in the early years of a new
century and in the wake of a number of critical junctures,
including 9/11, which have transformed the social, political, and
cultural environment; to present a selection of the diverse
epistemological and methodological frameworks which inform current
research; and finally to set out some fruitful directions for the
future study of punishment. The contributions to this collection
cover some of the most exciting and challenging areas of current
research including terrorism and the politics of fear, penality in
societies in transition, penal policy and the construction of
political identity, the impact of digital culture on modes of
compliance, the emergent hegemony of information and surveillance
systems, and the evolving politics of victimhood.
|
You may like...
Love Sux
Avril Lavigne
CD
R178
R148
Discovery Miles 1 480
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|