Catalog Search Results
Author
Description
The very first thing ever bought or sold on the Internet was marijuana, when Stanford and MIT students used ARPANET to cut a deal in the early '70s. Today, you can order any conceivable pill or powder with the click of a mouse. In Drugs Unlimited, Mike Power tells the tale of drugs in the Internet Age, in which users have outmaneuvered law enforcement, breached international borders, and created a massive worldwide black market.
But, the online market...
Author
Series
Description
The history of espionage accompanies humanity and all the empires that have needed to protect themselves and watch their enemies. From the Romans to the Cold War superpowers, adversary intelligence has been yet another weapon, often the instrument that has succeeded in disrupting the most elaborate military operations. At present, espionage continues alongside governments, unscrupulous businessmen, and anonymous hackers, capable of obtaining thousands...
Author
Description
The Dark Side of the Web' is a comprehensive exploration of the hidden world of cybercrime, where malicious actors use the internet to engage in illegal activities such as hacking, data theft, fraud, and extortion. This book provides a detailed examination of the tactics, techniques, and technologies used by cybercriminals to carry out their nefarious activities, as well as the latest trends in cybercrime, including ransomware, social engineering,...
Author
Description
Money Laundering: A Comprehensive GuideUnveil the secrets of money laundering and equip yourself to combat financial crime with this definitive guide.Dr. Samuel James, a distinguished medical doctor and MBA graduate from Deakin University, Australia, draws upon his unique expertise to deliver a comprehensive understanding of this complex issue. Through engaging case studies and insightful discussions, you will:Master the intricacies of money laundering,...
Author
Description
Chasing Thieves tells the true story of how I overcame identity theft to catch the criminal and recover from the personal and financial trauma that turned my life upside down.
Every year hundreds of thousands of Americans become the victims of identity theft. In most cases the thief is not found; the victim never has the satisfaction of knowing how the thief came to target them. But my story had a very different ending. You may even have heard about...
Author
Description
Identity Theft Preventionwhat to do when your identity is stolen & how to repair your credit Melvyn C.C. ValenzuelaIdentity Theft Preventionwhat to do when your identity is stolen & how to repair your credit This book explains not only what identity theft is and how it occurs, but also, how you can prevent it. It will guide you on what to do when you fall victim to identity theft and repair your credit standing. The best thing you can do is to protect...
Author
Description
Author Jolene Johnson, portrays the harrowing story, of how she was, defamed online by a licensed private investigator. Johnson, shares the emotional trauma and takes us through her journey, to seek justice. Johnson, shares her emotional journey of how she was constantly, harassed and bullied online, by virtually a stranger, by a man, who is supposed to be a professional.... At least his license suggests that he should be professional.
What do you...
Author
Description
The investigative journalist and author of Acid Attack reveals the true story of one innocent man's battle to salvage his reputation and his life.
As army veteran Bill Johnstone watched his garage business burn to the ground, he was certain the fire had been started deliberately. And, when the police failed to investigate, he complained.
Johnstone then made a shocking discovery: an extensive criminal record had been applied to his name. He believes...
Author
Series
Description
Three women relate their harrowing stories in this powerful true crime collection.
This volume includes three accounts of horrifying crimes told by women involved in them, whether as victim, witness, or family member:
You Have a Very Soft Voice, Susan: This is not a typical story of Internet stalking. It is an unusual case of friendship and deception so pitiless and unyielding that it opened a door to Hell into the author's life. This is an unforgettable...
Author
Description
Embark on an eye-opening journey into the clandestine world of cyber espionage and international intrigue with this gripping book. Delve deep into the intricate web of covert operations orchestrated by the United States National Security Agency (NSA), exploring its far-reaching impact on the global stage, particularly within the Transatlantic region.Prepare to be captivated as this book navigates the intricate landscapes of cyber espionage, revealing...
Author
Description
"How Social Media Shapes Our Lives and Relationships" delves into the profound impact of social media on our modern existence, exploring its evolution, prevalence, and consequences. The journey begins with an 'Introduction to Social Media', providing a historical overview and tracing the development of various platforms. 'The Rise of Social Media' investigates its popularity and growth through compelling statistics and demographics. Chapters such...
Author
Description
Everyone has to address and be aware of cyber security today; anybody or everything that accesses the Internet is a target.
Do you ever wonder how cyber security pertains to your daily life, what's at stake, and how you may particularly lock down your devices and digital traces to avoid being "Hacked"?
Do you operate a company, and are you now realizing how dangerous cyber-attacks are to your assets?
Do you want to learn how to rapidly establish...
Author
Description
In "Dawn of Distrust: Technological Threads Weaving a Trustless Society," embark on a riveting exploration into a future where trust is a relic of the past and transparency reigns supreme. Delve into the intricacies of a society transformed by technological innovation, where every aspect of life is governed by algorithms and data.Follow the journey of diverse characters as they navigate the promises and perils of a trustless world. From the unveiling...
14) Devil's Coin
Author
Formats
Description
The astonishing true story of the Scottish coal miner’s daughter who took on the Mafia-endorsed creators of the world’s biggest financial fraud and helped the FBI to convict them—soon to be a major motion picture.
A teenaged mother, today a young grandmother, Jen McAdam was a victim of the OneCoin global crypto-currency fraud, which stole around $27 billion from ordinary people around the world. Unlike Madoff or Enron, who relieved the world’s...
Author
Description
"Fraud Fighters" is a comprehensive guide to identifying, preventing, and fighting fraud. With the increasing prevalence of scams and deceptive practices in the digital age, it's more important than ever to know how to protect yourself and your finances. This book offers practical strategies and tools for recognizing and avoiding fraud, as well as tips for taking action against scammers and recovering from financial losses. Whether you're a business...
Author
Description
In 'Journey from Darkness to Light,' the author takes you on an incredible and harrowing journey through the darkest moments of their life. From the tragic loss of a beloved sister to academic exclusion, a tumultuous relationship, and a perilous job abroad turned human trafficking nightmare, this is a story of resilience, survival, and ultimate redemption. Forced to cross borders and become a cyber slave, the author's courage and determination shine...
Author
Description
"Retail Security: Strategies and Solutions for Safeguarding Your Business" is a comprehensive guide for retailers looking to enhance their security measures and protect their assets. This book covers a range of topics, including loss prevention techniques, physical security breaches, employee theft, cybercrime, and organized retail crime.The book begins by discussing various loss prevention techniques, such as CCTV and surveillance systems, access...
Author
Description
"Life and Challenges of IT Professionals" provides an insightful journey into the dynamic realm of Information Technology, unraveling the intricacies of the profession and the individuals who drive its evolution. We embark on a comprehensive exploration of the digital age, tracing the rise of IT professionals from its inception to the present day. The book encompasses a broad spectrum of topics, from the ever-evolving tech landscape and the challenges...
Author
Description
This book shows unequivocally that cyber weapons create deep psychological harm to society. So long lasting and intense can these effects be that they can create paranoia and cognitive confusion. Cyber weapons include simple ransomware to sophisticated bots, which can be used to bring down a nation's infrastructure, power lines, banking, and even nuclear facilities. The use of cyber weapons to sow seeds of discord in society, change human behavior,...
Author
Description
Pay up or shut down. You choose.
Cybercrime is on the rise and hackers have moved on from targeting individuals to targeting corporations both large and small. In recent memory, many high-profile companies have been the victim of some form of cyberattack.
Healthcare has emerged as a lucrative target for these crimes. Attacks jeopardize the safety of patients and security of caregivers.
This is the story of how one hospital system was held hostage...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request