Amazon Price: N/A (as of June 17, 2019 07:25 –
The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.
Continue reading “Stealing the Network: How to Own an Identity: How to Own an Identity”
Amazon Price: N/A (as of June 17, 2019 11:15 –
At last, the first full account of the cypherpunks who aim to free the world’s institutional secrets, by Forbes journalist Andy Greenberg who has traced their shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond.
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.
Continue reading “This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers”
Amazon Price: $39.00 $36.66 You save: $2.34 (6%). (as of June 17, 2019 11:00 –
This paper examines the phenomenon of cybercrime, as a serious hazard of new, digital society. Different forms of cybercrime are described, accompanied with up-to-date statistical data. Focus is put on available international legal framework as well as on the major institutional bodies – state or non-governmental – aimed to achieve security in cyberspace. The authors also attempt to evaluate the costs of particular cyber, criminal activities whereas basic ethical issues regarding piracy are also examined. Finally, this work end with the study case elaborating the cyber issue in the Central Asian Republics (Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan).
Amazon Price: $110.00 $96.28 You save: $13.72 (12%). (as of June 17, 2019 02:34 –
'Professor Chang s very thoughtful and impressively researched study of cybercrime in the greater China region is an invaluable contribution to the information and analyses available in this area. It not only provides important, and heretofore unavailable data, about the incidence and nature of cybercrime in this region, it also offers insightful suggestions into how this problem can most effectively be controlled. It belongs in the library of anyone interested in this area.'
– Susan Brenner, University of Dayton, US
'East Asia is a heartland of the variegated scams of the cybercrime problem. Yao Chung Chang's book is an innovative application of routine activity theory and regulatory theory to cybercrime prevention across the cybergulf between China and Taiwan. The long march through the scams and across the Taiwan Strait is fascinating. Chang leads us to ponder a wiki cybercrime prevention strategy that might work in such treacherous waters.'
– John Braithwaite, Australian National University
Continue reading “Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait”
Amazon Price: N/A (as of June 17, 2019 09:40 –
Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Whos really in control of whats happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internets challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. Its a book about the fate of one idea–that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Googles struggles with the French government and Yahoos capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBays struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.