AS CYBER SECURITY LAW DEVELOPS

Amazon Price: N/A (as of September 20, 2017 02:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

AS CYBER SECURITY LAW DEVELOPS

Cyber security slowly is beginning to achieve centre stage attention. Various cyber security breaches in different parts of the world have convinced almost all stakeholders that there is a need for having in place legal frameworks to address the growing menace of cyber security breaches. It is in this regard that cyber security law as a jurisprudential subject is beginning to evolve. The said subject is coming up as a distinct discipline within the overall umbrella of Cyberlaw jurisprudence.
Continue reading “AS CYBER SECURITY LAW DEVELOPS”

SOCIAL MEDIA & MOBILE LAW – SOME EMERGING CHALLENGES

Amazon Price: N/A (as of September 20, 2017 20:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

SOCIAL MEDIA & MOBILE LAW – SOME EMERGING CHALLENGES

Today, mobile has been a game changer in our day-to-day lives. It has not only changed the way how we communicate with each other but more significantly has provided us the mobile platform for accessing social media, while being on the go. Consequently, various social media platforms and networks have consistently targeted mobile users. It is common knowledge that the mobile users of social media are constantly growing. It is therefore but natural to expect that social media platforms are now increasingly providing mobile applications for the purposes of accessing social media.
Continue reading “SOCIAL MEDIA & MOBILE LAW – SOME EMERGING CHALLENGES”

Security Operations Center – Analyst Guide: SIEM Technology, Use Cases and Practices

Rating: 
Amazon Price: $59.00 $58.68 You save: $0.32 (1%). (as of September 19, 2017 23:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this. A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments.

Penetration Testing for Business: SMB’s & Ethical hacking

Amazon Price: $6.19 $6.19 (as of September 20, 2017 09:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber crime is on the increase, and with small to medium business (SMB’S) very much in the focus of attackers, competing companies, disgruntled employees, script kiddies and anonymous hackers can all pose a danger to a company’s computer systems, penetration testing is a good tried and tested method of solving security problems before they can occur and can be part of a strong security policy and a good security audit methodology.but what exactly is a penetration test? and what does it involve? this short book attempts to explain to Business owners or managers and those with an interest in the subject what is involved and how a typical penetration test is done.

Hacktivism and Cyberwars: Rebels with a Cause?

Rating: 
Amazon Price: N/A (as of September 20, 2017 15:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As global society becomes more and more dependent, politically and economically, on the flow of information, the power of those who can disrupt and manipulate that flow also increases. In Hacktivism and Cyberwars Tim Jordan and Paul Taylor provide a detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics. They describe the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. A full explanation is given of the different strands of hacktivism and the 'cyberwars' it has created, ranging from such avant garde groups as the Electronic Disturbance Theatre to more virtually focused groups labelled 'The Digitally Correct'. The full social and historical context of hacktivism is portrayed to take into account its position in terms of new social movements, direct action and its contribution to the globalization debate.

This book provides an important corrective flip-side to mainstream accounts of E-commerce and broadens the conceptualization of the internet to take into full account the other side of the digital divide.