Experience reading like never before
Read in your favourite format - print, digital or both. The choice is yours.
Track the shipping status of your print orders.
Discuss with other readersSign in to continue reading.

"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh Pal
The Cyber Age: Protecting National Security" is a must-read book for anyone interested in staying informed about the latest developments in cybersecurity and national defense. Written by experts in the field, this book provides a comprehensive overview of the challenges and opportunities presented by the digital age.
With the increasing frequency and sophistication of cyber attacks, protecting national security has never been more important. This book
The Cyber Age: Protecting National Security" is a must-read book for anyone interested in staying informed about the latest developments in cybersecurity and national defense. Written by experts in the field, this book provides a comprehensive overview of the challenges and opportunities presented by the digital age.
With the increasing frequency and sophistication of cyber attacks, protecting national security has never been more important. This book covers a wide range of topics related to cybersecurity and national security, including threat detection, cyber defense, the role of artificial intelligence, and the challenges of protecting critical infrastructure.
"The Cyber Age: Protecting National Security" is a valuable resource for government officials, military personnel, business leaders, and anyone concerned about the impact of cyber threats on national security. With its in-depth analysis and insights into the evolving nature of modern threats, this book is an essential addition to any library on cybersecurity and national defense.
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment.
This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include:
An in-dept
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment.
This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include:
An in-depth breakdown of the most common types of cyber fraud and scams.
The victim selection techniques and perpetration strategies of fraudsters.
An exploration of the impact of fraud upon victims and best practice examples of support systems for victims.
Current approaches for policing, punishing and preventing cyber frauds and scams.
This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.
The book is for everyone which includes Children’s online life is different from those of grown-ups, if their online safety is a constant worry this book is a great resource to use. It tells you the kind of trouble children can get into when they are online, and suggests simple yet effective ways to deal with such situations. This book is a must-read for every parent, teacher or child who wants to avoid the temptations and perils of cyberspace.
<
The book is for everyone which includes Children’s online life is different from those of grown-ups, if their online safety is a constant worry this book is a great resource to use. It tells you the kind of trouble children can get into when they are online, and suggests simple yet effective ways to deal with such situations. This book is a must-read for every parent, teacher or child who wants to avoid the temptations and perils of cyberspace.
In this book, renowned Researcher Peer Tehleel Manzoor explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best inte
In this book, renowned Researcher Peer Tehleel Manzoor explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.
Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks.
Are you sure you want to close this?
You might lose all unsaved changes.
India
Malaysia
Singapore
UAE
The items in your Cart will be deleted, click ok to proceed.