Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 16 of 16 matches in All Departments
'I have a gift for you and Nancy.' She put her hand into her pocket and pulled out two little plastic bags. There were two strings of rosary beads, black and shiny like a line of beetles. All families have secrets, but Bernadette's are more dangerous than most. On holiday in Northern Ireland in 1982, she and her older sister discover their family is involved with disappearances and murder. Thirty years later Nancy makes a disastrous return to the farm with her own family. The events of the past gradually and menacingly reveal why those sisters have not spoken to each other since that last disturbing summer together.
To counteract a cyber attacker, you need to learn to think like one. This book explores the psychology of cyber warfare and how organizations can thwart cyber attackers. Understand the Cyber Attacker Mindset examines the various types of cyber attackers out there and explores their motivations, including financial gain, revenge and the desire for power and control. It examines the methods used, such as social engineering and manipulation, and discusses the challenges faced by law enforcement in tracking and apprehending them. It provides a comprehensive look at the inner workings of the cyber attacker mind in the digital age and concludes with a set of strategies that organizations can deploy to counteract them, including tactics on training people to identify and resist manipulation. Written by a renowned cybersecurity leader, the book draws on interviews with top experts in the field in both public and private sectors to share rich insights and a wide range of case studies profiling notable cyber crime incidents. With continual technological advancements in cybersecurity, the cyber crime industry is increasingly falling back to social engineering and preying on people's vulnerabilities. The human side of cybersecurity has never been so important.
When Shona's teenage daughter goes missing, she's certain her ex-husband is the culprit. Her mother, Greta, is no help as she's too obsessed with being chased by the devil. Her uncle, Jimmy, is fresh out of prison and has never been entirely straight with her. Then there's the shaman living in her shed. All Shona wants is a simple life with her young son, and to get free of Maynard, the ex who's still living in the house. But nothing is ever straightforward and Shona soon discovers that the secrets she buried are as dangerous as the family curse that haunts her mother.
Ted moves to London to become a journalist but quickly slides into debt. Things look up when he is given the opportunity to go to Romania to interview a film director and then attend the Moscow film festival. But someone has other plans for him. Has he walked into a trap?
When fourteen-year-old Allie's mother, Mae, mysteriously disappears in the dark waters of the Sydney harbor, Allie must face the secrets buried in the mud-rich landscape of Mae's childhood. Set within Australia's lush rain forest at the height of the rainy season, Salt Rain is an absorbing debut about sifting through the complicated stories that shape us, and ultimately reclaiming them as our own.
To counteract a cyber attacker, you need to learn to think like one. This book explores the psychology of cyber warfare and how organizations can thwart cyber attackers. Understand the Cyber Attacker Mindset examines the various types of cyber attackers out there and explores their motivations, including financial gain, revenge and the desire for power and control. It examines the methods used, such as social engineering and manipulation, and discusses the challenges faced by law enforcement in tracking and apprehending them. It provides a comprehensive look at the inner workings of the cyber attacker mind in the digital age and concludes with a set of strategies that organizations can deploy to counteract them, including tactics on training people to identify and resist manipulation. Written by a renowned cybersecurity leader, the book draws on interviews with top experts in the field in both public and private sectors to share rich insights and a wide range of case studies profiling notable cyber crime incidents. With continual technological advancements in cybersecurity, the cyber crime industry is increasingly falling back to social engineering and preying on people's vulnerabilities. The human side of cybersecurity has never been so important.
Lead Fiction, Spring 2019: This thriller brilliantly evokes 1973 Moscow and a world of diplomacy and counter-espionage. Escaping failure as an undergraduate and a daughter, not to mention bleak 1970s England, Martha marries Kit - who is gay. Having a wife could keep him safe in Moscow in his diplomatic post. As Martha tries to understand her new life and makes the wrong friends, she walks straight into an underground world of counter-espionage. Out of her depth, Martha no longer knows who can be trusted.
Lead Fiction, Spring 2019: This thriller brilliantly evokes 1973 Moscow and a world of diplomacy and counter-espionage. Escaping failure as an undergraduate and a daughter, not to mention bleak 1970s England, Martha marries Kit - who is gay. Having a wife could keep him safe in Moscow in his diplomatic post. As Martha tries to understand her new life and makes the wrong friends, she walks straight into an underground world of counter-espionage. Out of her depth, Martha no longer knows who can be trusted.
The book offers an incisive collection of contemporary research into the problems of crime control and punishment. It has three inter-related aims: to take stock of current thinking on punishment, regulation, and control in the early years of a new century and in the wake of a number of critical junctures, including 9/11, which have transformed the social, political, and cultural environment; to present a selection of the diverse epistemological and methodological frameworks which inform current research; and finally to set out some fruitful directions for the future study of punishment. The contributions to this collection cover some of the most exciting and challenging areas of current research including terrorism and the politics of fear, penality in societies in transition, penal policy and the construction of political identity, the impact of digital culture on modes of compliance, the emergent hegemony of information and surveillance systems, and the evolving politics of victimhood. Taken together, this work draws connections between local problems of crime control, transnational forms of governance, and the ways in which certain political and jurisprudential discourses have come to dominate policy and practice in western penal systems. ERRATUM The sentence on p. 153, lines 5-7 should read "...if welfare expenditure had not risen but remained at its 1987 level, the rise in imprisonment would have been 20 per cent greater than actually occurred, i.e. from 75 in 1987 to 99 in 1998." No other part of the book is affected by this correction.
This collection presents a diverse set of case studies and theoretical reflections on how criminologists engage with practitioners and policy makers while undertaking research. The contributions to this volume highlight both the challenges and opportunities associated with doing criminological research in a reflexive and collaborative manner. They further examine the ethical and practical implications of the 'impact' agenda in the higher education sector with respect to the production and the dissemination of criminological knowledge. Developed to serve as an internationally accessible reference volume for scholars, practitioners and postgraduate criminology students, this book responds to the awareness that criminology as a discipline increasingly encompasses not only the study of crime, but also the agencies, process and structures that regulate it. Key questions include: How can criminal justice policy be studied as part of the field of criminology? How do we account for our own roles as researchers who are a part of the policy process? What factors and dynamics influence, hinder and facilitate 'good policy'?
Authored by top anesthetists, this Second Edition of Primary FRCA in a Box contains over 200 revision flashcards addressing almost all the topics needed to pass the Primary FRCA. Broad and wide-ranging subject areas are covered in easy-to-learn note format, including physiology, pharmacology, physics, and clinical measurement. The cards include key diagrams to aid understanding and are easy to reproduce in the oral exam.The cards include key diagrams to aid understanding and are easy to reproduce in the oral exam. Using standard question formats from the Royal College exams, Primary FRCA in a Box is an essential tool for effective revision and preparation for the Primary FRCA exams. It also provides essential revision for candidates studying for the Final FRCA exam who wish to have a concise review of Primary FRCA topics. These flashcards are recommended for all qualified and trainee anaesthetists and their trainers, and related health professionals.
Secure your business in a post-pandemic world: Master digital risk identification and defense Purchase of the print or Kindle book includes a free PDF eBook Key Features Become well-versed with sophisticated system-level security risks and the zero-trust framework Learn about remote working risks, modern collaboration, and securing the digital data estate Keep up with rapidly evolving compliances and regulations and their impact on cyber risks Book DescriptionWith the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. What you will learn Become aware of and adopt the right approach to modern digital transformation Explore digital risks across companies of all sizes Study real-world cases that focus on post-pandemic digital transformation Understand insider threats and how to mitigate vulnerability exploitation Get to know how cyberwarfare targets infrastructure and disrupts critical systems Discover how implementing a regulatory framework can safeguard you in the current and future data landscapes Who this book is forThis book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area. Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
The book offers an incisive collection of contemporary research into the problems of crime control and punishment. It has three inter-related aims: to take stock of current thinking on punishment, regulation, and control in the early years of a new century and in the wake of a number of critical junctures, including 9/11, which have transformed the social, political, and cultural environment; to present a selection of the diverse epistemological and methodological frameworks which inform current research; and finally to set out some fruitful directions for the future study of punishment. The contributions to this collection cover some of the most exciting and challenging areas of current research including terrorism and the politics of fear, penality in societies in transition, penal policy and the construction of political identity, the impact of digital culture on modes of compliance, the emergent hegemony of information and surveillance systems, and the evolving politics of victimhood.
|
You may like...
1 Recce: Volume 3 - Through Stealth Our…
Alexander Strachan
Paperback
Wits University At 100 - From Excavation…
Wits Communications
Paperback
Citizenship, Democracy and Higher…
J. Laker, C. Naval, …
Hardcover
Bearing Witness While Black - African…
Allissa V. Richardson
Hardcover
R2,467
Discovery Miles 24 670
|