Amazon Price: N/A (as of April 25, 2018 15:09 –
Today is the age of mobile applications. Various mobile applications of different nature and character are being used by mobile users across the world. One of the most important and popular mobile application is WhatsApp messenger. The advent and the increase growth of WhatsApp messenger has shown not just the popularity of the mobile app but has also given rise to various legal policy and regulatory issues pertaining to use of WhatsApp. A lot of people use WhatsApp in a for granted manner, without understanding the legal ramifications of the use of WhatsApp. However the increase usage of WhatsApp, in different parts of the world, has given rise to various legal and policy considerations and issues which require further discussion as time passes by.
Continue reading “WHATSAPP LAW”
Amazon Price: N/A (as of April 25, 2018 09:39 –
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use.
The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom.
Continue reading “The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice”
Amazon Price: $39.95 $39.95 (as of April 25, 2018 13:33 –
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation.
The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest.
Continue reading “Dissecting the Hack: The V3rb0t3n Network”
Amazon Price: N/A (as of April 25, 2018 23:39 –
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.
Amazon Price: N/A (as of April 25, 2018 18:55 –
ANTI-TERRORISM LAW – APPROACH IN CHINA
China as a nation is extremely significant at the world stage. The huge size of the population and the immense economic opportunities that abound in China, make it a nation whose policies are closely watched by the international community.
Continue reading “ANTI-TERRORISM LAW – APPROACH IN CHINA”