You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A major new expose of financial outrages in Washington, by the best-selling author and investigative journalist.
New ethnographic data leads to insights into the widespread yet understudied phenomenon of criminal extortion in Latin America.
This book presents a multi-disciplinary investigation into extortion rackets with a particular focus on the structures of criminal organisations and their collapse, societal processes in which extortion rackets strive and fail and the impacts of bottom-up and top-down ways of fighting extortion racketeering. Through integrating a range of disciplines and methods the book provides an extensive case study of empirically based computational social science. It is based on a wealth of qualitative data regarding multiple extortion rackets, such as the Sicilian Mafia, an international money laundering organisation and a predatory extortion case in Germany. Computational methods are used for data an...
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid—and the pros and cons of paying Use methods to protect your organization’s workstations and servers
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you...
First Published in 1975 Blackmail: Publicity and Secrecy in Everyday Life examines why blackmail is often taken more seriously than murder and why it is widely considered as a serious social threat. Both fictional and real-life situations are used to explore the kinds of social situation in which various individuals become vulnerable to blackmail. In isolating the key ingredients of reputational blackmail in Britain over the last hundred years, this book is not preoccupied with threats to accuse someone of a major criminal offence such as murder or armed robbery, but rather with those cases where the penalties of discovery are less clear-cut and where public reaction may be much more ambivalent. Mike Hepworth focuses attention on the way blackmail is stigmatized in criminological and other literature and the possible validity of the stereotype in the light of alternative interpretations. This book is an interesting read for scholars and researchers of criminology and sociology.
Important scholars offer new perspectives on the formation and growth of social institutions
Mafia-type organizations generate several distorting effects on the economy. In Italy their presence is endemic, and not only in Southern regions such as Sicily, Campania or Calabria. Such organizations endure the fierce and continuous pressure exerted by Italian anti-mafia policy, maybe the most articulate and effective such policy in the world. Nevertheless, they have survived by submerging, transforming, and relocating their operations. The analysis of the different Mafias of today benefits from a huge amount of empirical data produced by investigators. This allows us to outline more reliable indexes of the penetration of Mafiosi in given territories, as well as to estimate the size of th...