The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues.
With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues.
Amidst the sensationalist claims about the dangers of the Internet, Virtually Criminal provides an empirically grounded criminological analysis of deviance and regulation within an online community.
Amidst the sensationalist claims about the dangers of the Internet, Virtually Criminal provides an empirically grounded criminological analysis of deviance and regulation within an online community.
The Politics of Cyberconflict focuses on the implications that the phenomenon of cyberconflict (conflict in computer mediated enivironments and the internet) has on politics, society and culture.
The Politics of Cyberconflict focuses on the implications that the phenomenon of cyberconflict (conflict in computer mediated enivironments and the internet) has on politics, society and culture.
An essential reference for scholars and others whose work brings them into contact with managing, policing and regulating online behaviour, the Handbook of Internet Crime emerges at a time of rapid social and technological change.
An essential reference for scholars and others whose work brings them into contact with managing, policing and regulating online behaviour, the Handbook of Internet Crime emerges at a time of rapid social and technological change.
Crime Online is concerned to explore the dual capacity of the Internet to pervert and to democratize: it offers its users freedom, democracy, and communication with people around the world while at the same time generating anxieties concerning its potential to corrupt vulnerable minds and facilitate heinous crimes.
Crime Online is concerned to explore the dual capacity of the Internet to pervert and to democratize: it offers its users freedom, democracy, and communication with people around the world while at the same time generating anxieties concerning its potential to corrupt vulnerable minds and facilitate heinous crimes.
This book, written by two leading authorities in the field, provides a systematic application of concepts of situational crime prevention to internet and e-commerce crime, exploring ways in which concepts of crime prevention developed in other contexts can be fruitfully applied in this new environment.
This book, written by two leading authorities in the field, provides a systematic application of concepts of situational crime prevention to internet and e-commerce crime, exploring ways in which concepts of crime prevention developed in other contexts can be fruitfully applied in this new environment.
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "e;white-hat"e; hacker.
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "e;white-hat"e; hacker.
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data.
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data.
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers.
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers.
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity.
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity.
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software.
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software.
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type.
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type.
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
A hands-on, do-it-yourself guide to securing and auditing a networkCNN is reporting that a vicious new virus is wreaking havoc on the world s computer networks.
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities.