You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The hacking industry costs corporations, governments and individuals milliions of dollars each year. 'Low Tech Hacking' focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses.
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that e...
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive an...
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest strategi
Government media-making, from official websites to whistleblowers' e-mail, and its sometimes unintended consequences. Today government agencies not only have official Web sites but also sponsor moderated chats, blogs, digital video clips, online tutorials, videogames, and virtual tours of national landmarks. Sophisticated online marketing campaigns target citizens with messages from the government--even as officials make news with digital gaffes involving embarrassing e-mails, instant messages, and videos. In Virtualpolitik, Elizabeth Losh closely examines the government's digital rhetoric in such cases and its dual role as mediamaker and regulator. Looking beyond the usual focus on interfac...
Textbook on the deductive profiling method developed by the author.
None
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today's changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. - This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats - The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world - Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide
In the digital age, the convergence of advanced technologies and human behavior presents a complex cybersecurity challenge, particularly through the lens of social engineering. Social engineering attacks exploit psychological manipulation rather than relying solely on technical vulnerabilities. By leveraging human trust and deception, these attacks become particularly difficult to defend against, evolving alongside advancements in artificial intelligence, machine learning, and other technologies. This dynamic environment heightens the risk of cyber threats, underscoring the need for comprehensive and innovative strategies to address these emerging vulnerabilities. Effective Strategies for Co...