0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,253)
  • R250 - R500 (247)
  • R500+ (664)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Permanent Record (Paperback): Edward Snowden Permanent Record (Paperback)
Edward Snowden
R230 R190 Discovery Miles 1 900 Save R40 (17%) Ships in 5 - 10 working days

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

Password Book - Logbook to keep track of usernames, passwords and related details (Paperback): Imaginary Planet Publishing Password Book - Logbook to keep track of usernames, passwords and related details (Paperback)
Imaginary Planet Publishing
R174 Discovery Miles 1 740 Ships in 7 - 11 working days
#deleted - Big Tech's Battle to Erase the Trump Movement and Steal the Election (Standard format, CD): Allum Bokhari #deleted - Big Tech's Battle to Erase the Trump Movement and Steal the Election (Standard format, CD)
Allum Bokhari
R805 R582 Discovery Miles 5 820 Save R223 (28%) Ships in 7 - 11 working days
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285 (Paperback): Todd Lammle,... SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285 (Paperback)
Todd Lammle, Alex Tatistcheff, John Gay
R1,400 R958 Discovery Miles 9 580 Save R442 (32%) Ships in 10 - 15 working days

Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With clear and concise information regarding crucial next-generation network security topics, this comprehensive guide includes practical examples and insights drawn from real-world experience, exam highlights, and end of chapter reviews. Learn key exam topics and powerful features of the Cisco FirePOWER Services, including FireSIGHT Management Center, in-depth event analysis, IPS tuning and configuration, and snort rules language. Gain access to Sybex's superior online learning environment that includes practice questions, flashcards, and interactive glossary of terms. * Use and configure next-generation Cisco FirePOWER services, including application control, firewall, and routing and switching capabilities * Understand how to accurately tune your systems to improve performance and network intelligence while leveraging powerful tools for more efficient event analysis * Complete hands-on labs to reinforce key concepts and prepare you for the practical applications portion of the examination * Access Sybex's online interactive learning environment and test bank, which includes an assessment test, chapter tests, bonus practice exam questions, electronic flashcards, and a searchable glossary Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285 provides you with the information you need to prepare for the FirePOWER with Advanced FireSIGHT Administration examination.

Audacity to Spy - How Government, Business & Hackers Rob Us of Privacy (Paperback): Catherine Nolan, Ashley M Wilson Audacity to Spy - How Government, Business & Hackers Rob Us of Privacy (Paperback)
Catherine Nolan, Ashley M Wilson
R441 R368 Discovery Miles 3 680 Save R73 (17%) Ships in 7 - 11 working days
The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): Kevin D. Mitnick, William L Simon The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
Kevin D. Mitnick, William L Simon; Foreword by Steve Wozniak
R319 R217 Discovery Miles 2 170 Save R102 (32%) Ships in 10 - 15 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Permanent Record (Hardcover): Edward Snowden Permanent Record (Hardcover)
Edward Snowden 1
R533 R435 Discovery Miles 4 350 Save R98 (18%) Ships in 10 - 15 working days

Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

Cyber Smart - Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Paperback): Bart R. McDonough Cyber Smart - Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Paperback)
Bart R. McDonough
R420 R317 Discovery Miles 3 170 Save R103 (25%) Ships in 10 - 15 working days

An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret. In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from: Identify theft Compromising your children Lost money Lost access to email and social media accounts Digital security is one of the most important, and least understood, aspects of our daily lives. But it doesn't have to be. Thanks to its clear instruction, friendly tone, and practical strategies, Cyber Smart will help you rest more easily, knowing you and your family are protected from digital attack.

Permanent Record (Paperback): Edward Snowden Permanent Record (Paperback)
Edward Snowden 1
R340 R269 Discovery Miles 2 690 Save R71 (21%) Ships in 7 - 10 working days

Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

The Freedom of Information Officer's Handbook (Paperback): Paul Gibbons The Freedom of Information Officer's Handbook (Paperback)
Paul Gibbons
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

Freedom of information (FOI) is now an international phenomenon with over 100 countries from Albania to Zimbabwe enacting the right to know for their citizens. Since 2005, the UK's Freedom of Information Act has opened up thousands of public bodies to unparalleled scrutiny and prompted further moves to transparency. Wherever the right to know is introduced, its success depends on the way it is implemented. In organisations worldwide, FOI only works because of those who oversee its operation on a day-to-day basis, promoting openness, processing requests and advising colleagues and the public. FOI is dependent on the FOI Officers. The Freedom of Information Officer's Handbook is a comprehensive guide to FOI and its management. It is designed to be an indispensable tool for FOI Officers and their colleagues. It includes: a guide to the UK's FOI Act, the right to know and the exemptions clear analysis of the most important case law and its implications for the handling of FOI requests pointers to the best resources to help FOI officers in their work explanations of how FOI interacts with other legislation, including detailed explorations of the Environmental Information Regulations 2004 and how the EU's General Data Protection Regulation impacts on FOI a look at requirements to proactively publish information and the effect of copyright and re-use laws on FOI and open data comparisons of the UK's Act with FOI legislation in other jurisdictions from Scotland to South Africa an exploration of the role of the FOI Officer: who they are, what they do, their career development and what makes them effective suggestions on how to embed FOI within an organisation using effective procedures, technology and training a stage-by-stage guide to processing requests for information. The Freedom of Information Officers' Handbook includes the latest developments in FOI including amendments made to the UK's FOI Act by the Data Protection Act 2018 and the revised s.45 code of practice published by the Cabinet Office in July 2018.

Building Machine Learning Pipelines - Automating Model Life Cycles with Tensorflow (Paperback): Hannes Hapke, Catherine Nelson Building Machine Learning Pipelines - Automating Model Life Cycles with Tensorflow (Paperback)
Hannes Hapke, Catherine Nelson
R1,428 R1,091 Discovery Miles 10 910 Save R337 (24%) Ships in 7 - 11 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

Internet Password Book - Keep Track of Usernames, Passwords, and Web Addresses  in One Easy and Organized Location (Hardcover):... Internet Password Book - Keep Track of Usernames, Passwords, and Web Addresses in One Easy and Organized Location (Hardcover)
Editors of Chartwell Books
R186 R158 Discovery Miles 1 580 Save R28 (15%) Ships in 7 - 11 working days
97 Things about Ethics Everyone in Data Science Should Know - Collective Wisdom from the Experts (Paperback): Bill Franks 97 Things about Ethics Everyone in Data Science Should Know - Collective Wisdom from the Experts (Paperback)
Bill Franks
R924 R730 Discovery Miles 7 300 Save R194 (21%) Ships in 10 - 15 working days

Most of the high-profile cases of real or perceived unethical activity in data science aren't matters of bad intent. Rather, they occur because the ethics simply aren't thought through well enough. Being ethical takes constant diligence, and in many situations identifying the right choice can be difficult. In this in-depth book, contributors from top companies in technology, finance, and other industries share experiences and lessons learned from collecting, managing, and analyzing data ethically. Data science professionals, managers, and tech leaders will gain a better understanding of ethics through powerful, real-world best practices. Articles include: Ethics Is Not a Binary Concept-Tim Wilson How to Approach Ethical Transparency-Rado Kotorov Unbiased Fair-Doug Hague Rules and Rationality-Christof Wolf Brenner The Truth About AI Bias-Cassie Kozyrkov Cautionary Ethics Tales-Sherrill Hayes Fairness in the Age of Algorithms-Anna Jacobson The Ethical Data Storyteller-Brent Dykes Introducing Ethicize (TM), the Fully AI-Driven Cloud-Based Ethics Solution!-Brian O'Neill Be Careful with "Decisions of the Heart"-Hugh Watson Understanding Passive Versus Proactive Ethics-Bill Schmarzo

Password Organizer and Hide This Book - 6 X 9 See It Bigger Alphabet Password Organizer Book, Large Print with Tabbed Pages,... Password Organizer and Hide This Book - 6 X 9 See It Bigger Alphabet Password Organizer Book, Large Print with Tabbed Pages, Over 200 Record User and Password. Keep Favorite Website, Username, Email Used, and Passwords in One Easy, Convenient Place (Paperback)
Ellie And Scott
R148 Discovery Miles 1 480 Ships in 7 - 11 working days
Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover): Larry A Schwartz Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover)
Larry A Schwartz
R4,002 Discovery Miles 40 020 Ships in 10 - 15 working days

In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover)
Adam Henschke
R2,213 Discovery Miles 22 130 Ships in 10 - 15 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

WHOIS Running the Internet - Protocol, Policy, and Privacy (Hardcover): Garth O. Bruen WHOIS Running the Internet - Protocol, Policy, and Privacy (Hardcover)
Garth O. Bruen
R1,917 Discovery Miles 19 170 Ships in 10 - 15 working days

Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. * Includes an appendix with information on current and authoritative WHOIS services around the world * Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them * Explains network dependencies and processes related to WHOIS utilizing flowcharts * Contains advanced coding for programmers * Visit the book's companion website http://whois.knujon.com for technical and policy documents concerning WHOIS, WHOIS code examples, internet locations for WHOIS databases and more. WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys. Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.

Kali Linux Revealed - Mastering the Penetration Testing Distribution (Paperback): Raphael Hertzog, Mati Aharoni, Jim... Kali Linux Revealed - Mastering the Penetration Testing Distribution (Paperback)
Raphael Hertzog, Mati Aharoni, Jim O'Gorman
R621 Discovery Miles 6 210 Ships in 10 - 15 working days
Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main): Vince... Nuking the Moon - And Other Intelligence Schemes and Military Plots Best Left on the Drawing Board (Paperback, Main)
Vince Houghton 1
R275 R220 Discovery Miles 2 200 Save R55 (20%) Ships in 5 - 10 working days

"Compulsively readable laugh out loud history." Mary Roach Bomb-carrying bats. Poisoned flower arrangements. Cigars laced with mind-altering drugs. Listening devices implanted into specially-trained cats. A torpedo-proof aircraft carrier made out of ice and sawdust. And a CIA plan to detonate a nuclear bomb on the moon ... just because. In Nuking the Moon, Vince Houghton, Historian and Curator at the International Spy Museum, collects the most inspired, implausible and downright bizarre military intelligence schemes that never quite made it off the drawing board. From the grandly ambitious to the truly devious, they illuminate a new side of warfare, revealing how a combination of desperation and innovation led not only to daring missions and brilliant technological advances, but to countless plans and experiments that failed spectacularly. Alternatively terrifying and hilarious, and combining archival research with newly-conducted interviews, these twenty-six chapters reveal not only what might have happened, but also what each one tells us about the history and people around it. If 'military intelligence' makes you think of James Bond and ingenious exploding gadgets ... get ready for the true story.

Federal Cybersecurity - Identification & Mitigation Efforts of Sector-Specific Agencies (Paperback): Jeffery H. Matthews Federal Cybersecurity - Identification & Mitigation Efforts of Sector-Specific Agencies (Paperback)
Jeffery H. Matthews
R1,650 Discovery Miles 16 500 Ships in 10 - 15 working days

U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission facilities, are systems and assets, whether physical or virtual, vital to the nations security, economy, and public health and safety. To secure these systems and assets, federal policy and the National Infrastructure Protection Plan (NIPP) establish responsibilities for federal agencies designated as Sector-specific agencies (SSAs), including leading, facilitating, or supporting the security and resilience programs and associated activities of their designated critical infrastructure sectors. The objectives of this book are to determine the extent to which SSAs have identified the significance of cyber risks to their respective sectors networks and industrial control systems; taken actions to mitigate cyber risks within their respective sectors; collaborated across sectors to improve cybersecurity; and established performance metrics to monitor improvements in their respective sectors.

The Intelligent Marketer's Guide to Data Privacy - The Impact of Big Data on Customer Trust (Hardcover, 1st ed. 2019):... The Intelligent Marketer's Guide to Data Privacy - The Impact of Big Data on Customer Trust (Hardcover, 1st ed. 2019)
Robert W. Palmatier, Kelly D. Martin
R648 R579 Discovery Miles 5 790 Save R69 (11%) Ships in 10 - 15 working days

Firms are collecting and analyzing customer data at an ever increasing rate in response to evidence that data analytics (precision targeting, improved selling) generates a positive return. Yet efforts often ignore customers' privacy concerns and feelings of vulnerability with long-term effects on customers' trust, relationships, and ultimately financial performance. Big data, privacy, and cybersecurity often is relegated to IT and legal teams with minimal regard for customer relationships. This book fills the void by taking a customer-centric approach to privacy. It offers both defensive and offensive marketing-based privacy strategies that strongly position firms in today's data-intensive landscape. The book also helps managers anticipate future consumer and legislative trends. Drawing from the authors' own work and extant research, this book offers a compelling guide for building and implementing big data- and privacy-informed business strategies. Specifically, the book: * -Describes the consumer psychology of privacy * -Deconstructs relevant legal and regulatory issues * - Offers defensive privacy strategies * - Describes offensive privacy strategies * Provides an executive summary with the Six Tenets for Effective Privacy Marketing This book will be useful to managers, students, or the casual reader who is interested in how and why big data and consumer privacy are transforming business. Moving beyond summary privacy insights, the book also offers a detailed and compelling action plan for improving performance by protecting against privacy threats as well as developing and implementing offensive privacy strategy. In the future, many firms will be competing through an integrated, customer-centric big data privacy strategy and this book will guide managers in this journey.

The Official (ISC)2 Guide to the CCSP CBK (Hardcover, 2nd Edition): Adam Gordon The Official (ISC)2 Guide to the CCSP CBK (Hardcover, 2nd Edition)
Adam Gordon
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. This Second Edition features clearer diagrams as well as refined explanations based on extensive expert feedback. Sample questions help you reinforce what you have learned and prepare smarter. Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)^2, endorsed by the Cloud Security Alliance(R) (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)^2 Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2020): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2020)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R3,389 Discovery Miles 33 890 Ships in 7 - 11 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

The Art of Deception - Controlling the Human Element of Security (Hardcover): Kevin D. Mitnick, William L Simon The Art of Deception - Controlling the Human Element of Security (Hardcover)
Kevin D. Mitnick, William L Simon; Foreword by Steve Wozniak
R917 R652 Discovery Miles 6 520 Save R265 (29%) Ships in 10 - 15 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Kingdom Of Lies - Unnerving Adventures In The World Of Cybercrime (Hardcover): Kate Fazzini Kingdom Of Lies - Unnerving Adventures In The World Of Cybercrime (Hardcover)
Kate Fazzini 1
R450 R385 Discovery Miles 3 850 Save R65 (14%) Ships in 10 - 15 working days

Would you say your phone is safe, or your computer? What about your car? Or your bank?

There is a global war going on and the next target could be anyone, from a global corporation to a randomly selected person. From cybercrime villages like Ramnicu Valcea in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history, and those committed to stopping them.

Kate Fazzini has met the hackers that create new cyberweapons, develop ransomware that can stop international banks in their tracks, and hack sports cars for good and ill. Kingdom of Lies is a fast-paced look at the technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Grandma's Password Book - Granny's…
Secure Publishing Paperback R142 Discovery Miles 1 420
Customer Data + Privacy - The Insights…
Harvard Business Review Paperback R383 Discovery Miles 3 830
Cinderella's Stick - A Fairy Tale for…
Yannis Tzitzikas, Yannis Marketakis Hardcover R1,379 Discovery Miles 13 790
How to Talk to Your Kids About…
Educate and Empower Kids, Dina Alexander Paperback R318 R262 Discovery Miles 2 620
Hello World - How to be Human in the…
Hannah Fry Paperback  (2)
R215 R172 Discovery Miles 1 720
My Online Privacy for Seniors
Jason Rich Paperback R380 R321 Discovery Miles 3 210
Social Engineering - The Science of…
Christopher Hadnagy Paperback R789 R499 Discovery Miles 4 990
Of Privacy and Power - The Transatlantic…
Henry Farrell, Abraham L. Newman Hardcover R718 R548 Discovery Miles 5 480
Click Here to Kill Everybody - Security…
Bruce Schneier Paperback R337 Discovery Miles 3 370
200+ Ways to Protect Your Privacy…
Jeni Rogers Paperback  (2)
R293 R205 Discovery Miles 2 050

 

Partners