The Routledge Handbook of Remix Studies and Digital Humanities
In this comprehensive and highly interdisciplinary companion, contributors reflect on remix across the broad spectrum of media and culture, with each chapter offering in-depth reflections on the relationship between remix studies and the digital humanities. The anthology is organized into sections that explore remix studies and digital humanities in relation to topics such as archives, artificial intelligence, cinema, epistemology, gaming, generative art, hacking, pedagogy, sound, and VR, amon...
Exploring Social Media-Related Cyber Crimes in Central India
by Durgesh Keswani
A true story of obsessive love turning to obsessive hate, Give Me Everything You Have chronicles the author’s strange and harrowing ordeal at the hands of a former student, a self-styled ‘verbal terrorist’, who began trying, in her words, to ‘ruin him’. Hate-mail – much of it violently anti-Semitic – online postings and public accusations of theft and sexual misconduct, have been her weapons of choice, and, as with more conventional terrorist weapons, have proved remarkably difficult to combat.J...
As technology has evolved, so has crime. Digital technologies have brought with them a whole host of crimes committed online-unsuspecting people are cheated of crores of rupees, duped by false advertisements on fake websites, incited to click on suspicious links through payment gateways, and download apps that give remote access of their device to criminals. From credit card fraud to phishing, the list is endless. Cyber Encounters delves deep into this nebulous cyberspace, to bring twelve fascin...
Investigation on Phishing Attacks and Modelling Intelligent
by Satheesh Kumar M
To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and presents a set of strategies that organizations can deploy to counteract them. With technological advancements in cybersecurity, attackers are increasingly falling back to so...
From a famous actor and an experienced journalist, a wildly entertaining debunking of cryptocurrency, one of the greatest frauds in history and on course for a spectacular crash. At the height of the pandemic, TV star Ben McKenzie (The O.C., Gotham) was the perfect mark for cryptocurrency: a dad stuck at home with some cash in his pocket, worried about his family, armed with only the vague notion that people were making heaps of money on something he—despite a degree in economics—didn’t entirely...
Women Crime Writers Volume Two (Women Crime Writers, #1)
by Susan Fentsen, Denise Wallace, and Anna Yourkin
A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. “Both a real-life, tension-packed thriller and a persuasive argument for traditional intelligence work in the information age.”—Bruce Schneier, New York Times bestselling author of Data and Goliath and Click Here to Kill Everybody Eric O’Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover...
Fraudster, swindler, conman, chancer, trickster, loveable rogue, the Southerner with more front than Southend - call him what you will.Tony Sales knew how to make money.From emptying fruit machines to cloning credit cards, the man from Bermondsey made a mint. And boy did he splash the cash. Fast cars, holidays in sun-kissed millionaires' playgrounds, mixing with the great and the good.Then came the internet - the game-changer. Data became the new currency, and how he exploited it, stealing ident...
What Do You Want Me to Do?