Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders.
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity.
The latest techniques for averting UC disasterEstablish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
This book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
A Fresh Look at Fraud features psychologists, criminologists, and computer scientists to address the state-of-the-art research on the rising problem of fraud, scams, and financial abuse, stimulating a cross-disciplinary exchange of ideas, theories, methods, and practices.
This volume brings together leading researchers to celebrate the significant contributions of Peter Grabosky to the field of Criminology, and in particular his work developing and adapting regulatory theory to the study of policing and security.
This book documents the evolution of the United Nations (UN) Crime Programme and its changing priorities, from the early focus on juvenile delinquency and correctional treatment, to the present preoccupation with transnational organized crime.
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018.
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity.
As organizations grow increasingly complex and unpredictable, the topic of proactivity at work has become of great importance for contemporary workplaces.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people.
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021.
Examining how victimisation can occur across the online-offline continuum while emphasising the need for a holistic approach to understanding and addressing contemporary harms, this book covers various themes of victimisation in the digital age linked to the interconnectedness and blurred boundaries between online and offline experiences.
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity.
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public.
This book explores, through a children's rights-based perspective, the emergence of a safeguarding dystopia in child online protection that has emerged from a tension between an over-reliance in technical solutions and a lack of understanding around code and algorithm capabilities.
The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk.
Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic.