You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing ta
“DESTINI HACKER (The Hackers’ Destiny)– Attack to the System” was published in eBooks by Blonk a few days before the explosion of the PRISM scandal in the US, which is causing more than a headache to the Obama administration. The opening episode of “Destini Hacker”, which uses its plot to highlight problems on computer security both in the public and private sectors wants to lead the reader into the world of hacking. Its nucleus is a system which, exactly like the US National Security Agency’s PRISM, is capable of spying the web, telephones and processing potentially infinite bulks of data exchanged on-line. Systems similar to the one of the National Security Agency are described in the first episode of “Destini Hacker- Attack to the System”: government agencies on one side and more-or- less good-natured hackers on the other side fight each other to get hold of sensitive date, confidential information and access keys. Hackers Mayhem and Gizmo, a couple of the main characters, are actually the designers of a system which is constantly capable of tracing everything that happens on the Web during their monitoring forays.
In this book, the following subjects are included: information security, the risk assessment and treatment processes (with practical examples), the information security controls. The text is based on the ISO/IEC 27001 standard and on the discussions held during the editing meetings, attended by the author. Appendixes include short presentations and check lists. CESARE GALLOTTI has been working since 1999 in the information security and IT process management fields and has been leading many projects for companies of various sizes and market sectors. He has been leading projects as consultant or auditor for the compliance with standards and regulations and has been designing and delivering ISO/IEC 27001, privacy and ITIL training courses. Some of his certifications are: Lead Auditor ISO/IEC 27001, Lead Auditor 9001, CISA, ITIL Expert and CBCI, CIPP/e. Since 2010, he has been Italian delegate for the the editing group for the ISO/IEC 27000 standard family. Web: www.cesaregallotti.it.
100.872
100.660
L'opera analizza l'attività di ricerca ed acquisizione, a fini penalistici, della prova digitale archiviata all'interno dei dispositivi elettronici. Viene proposta una riflessione sui principali istituti giuridici e sulle pronunce giurisprudenziali più rilevanti di questo settore. Particolare attenzione è poi dedicata al tema della difficile coesistenza tra le esigenze legate all’accertamento e repressione del fenomeno criminoso e le attuali istanze di protezione della privacy individuale, bene giuridico che, nell’era di Internet e delle nuove tecnologie informative, ha progressivamente assunto una sempre maggiore centralità.