Amazon Price: $102.95 $101.20 You save: $1.75 (2%). (as of February 18, 2018 02:35 –
Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means. The Law of Cybercrimes and Their Investigations is a comprehensive text exploring the gamut of issues surrounding this growing phenomenon.
After an introduction to the history of computer crime, the book reviews a host of topics including:
Continue reading “The Law of Cybercrimes and Their Investigations”
Amazon Price: N/A (as of August 6, 2017 23:24 –
If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.
From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft™ and Second Life®. This no-holds-barred book comes fully loaded with code examples, debuggers, bots, and hacks.
This book covers Why online games are a harbinger of software security issues to come How millions of gamers have created billion-dollar virtual economies How game companies invade personal privacy Why some gamers cheat Techniques for breaking online game security How to build a bot to play a game for you Methods for total conversion and advanced mods
Written by the world's foremost software security experts, this book takes a close look at security problems associated with advanced, massively distributed software. With hundreds of thousands of interacting users, today's online games are a bellwether of modern software. The kinds of attack and defense techniques described in Exploiting Online Games are tomorrow's security techniques on display today.
Amazon Price: $31.95 $23.64 You save: $8.31 (26%). (as of February 18, 2018 00:02 –
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based?
Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict.
Continue reading “Cyber War versus Cyber Realities: Cyber Conflict in the International System”
Amazon Price: $44.95 $31.70 You save: $13.25 (29%). (as of February 18, 2018 05:53 –
Wish your favorite PC game had a more informative heads up display? What if you could instantly collect all that loot from your latest epic battle? You don't need to be a sorcerer to transform a game you like into a game you love. Just make a bot to do the grunt work for you!
If you're familiar with Windows-based development and memory management, then Game Hacking, provides all the tools and knowledge you need to become a true game hacker. Let veteran game hacker Nick Cano teach you the basics, including reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection. Throughout the book, you'll hone your new skills with hands-on labs, dig into practice binaries, and learn to write your own bot.
Continue reading “Game Hacking: Developing Autonomous Bots for Online Games”
Amazon Price: $69.95 $59.93 You save: $10.02 (14%). (as of February 17, 2018 18:35 –
This book offers a comprehensive and integrative introduction to cybercrime. It offers an authoritative synthesis of the disparate literature on the various types of cybercrime, the investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of:
key theoretical and methodological perspectives,
Continue reading “Cybercrime and Digital Forensics: An Introduction”