Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type.
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type.
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
A hands-on, do-it-yourself guide to securing and auditing a networkCNN is reporting that a vicious new virus is wreaking havoc on the world s computer networks.
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
Exploring the pressing issues of juvenile delinquency, victimization, and justice in Chinese societies, this book showcases contemporary research on these critical topics.
Aslam and Gunaratna bring together a broad analysis of the responses of states in Asia to the threats presented by the COVID-19 pandemic in its early phase.
Aslam and Gunaratna bring together a broad analysis of the responses of states in Asia to the threats presented by the COVID-19 pandemic in its early phase.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses.
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon.
Terrorism in the Twenty-First Century helps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon.
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition.
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.