0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R100 - R250 (4)
  • R250 - R500 (35)
  • R500+ (308)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings... Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings (Paperback, 1st ed. 2019)
Hilde Perez Garcia, Lidia Sanchez Gonzalez, Manuel Castejon Limas, Hector Quintian Pardo, Emilio Corchado Rodriguez
R1,614 Discovery Miles 16 140 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019. The 64 full papers published in this volume were carefully reviewed and selected from 134 submissions. They are organized in the following topical sections: data mining, knowledge discovery and big data; bio-inspired models and evolutionary computation; learning algorithms; visual analysis and advanced data processing techniques; data mining applications; and hybrid intelligent applications.

Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg,... Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings (Paperback, 1st ed. 2019)
Roberto Perdisci, Clementine Maurice, Giorgio Giacinto, Magnus Almgren
R2,135 Discovery Miles 21 350 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.

Cybercrime and Digital Deviance (Paperback): Roderick S Graham, Shawn K. Smith Cybercrime and Digital Deviance (Paperback)
Roderick S Graham, Shawn K. Smith
R1,325 Discovery Miles 13 250 Ships in 12 - 17 working days

Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming. Other issues are explored including cybercrime investigations, organized cybercrime, the use of algorithms in policing, cybervictimization, and the theories used to explain cybercrime. Graham and Smith make a conceptual distinction between a terrestrial, physical environment and a single digital environment produced through networked computers. Conceptualizing the online space as a distinct environment for social interaction links this text with assumptions made in the fields of urban sociology or rural criminology. Students in sociology and criminology will have a familiar entry point for understanding what may appear to be a technologically complex course of study. The authors organize all forms of cybercrime and cyberdeviance by applying a typology developed by David Wall: cybertrespass, cyberdeception, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime. Because it is based on legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions it provides a solid foundation for deeper study. Taken together, Graham and Smith's application of a digital environment and Wall's cybercrime typology makes this an ideal upper level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7,... Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Sokratis K. Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Anton, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R434 Discovery Miles 4 340 Ships in 10 - 15 working days
Fraud Prevention in Online Digital Advertising (Paperback, 1st ed. 2017): Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao,... Fraud Prevention in Online Digital Advertising (Paperback, 1st ed. 2017)
Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish, …
R1,852 Discovery Miles 18 520 Ships in 10 - 15 working days

The authors systematically review methods of online digital advertising (ad) fraud and the techniques to prevent and defeat such fraud in this brief. The authors categorize ad fraud into three major categories, including (1) placement fraud, (2) traffic fraud, and (3) action fraud. It summarizes major features of each type of fraud, and also outlines measures and resources to detect each type of fraud. This brief provides a comprehensive guideline to help researchers understand the state-of-the-art in ad fraud detection. It also serves as a technical reference for industry to design new techniques and solutions to win the battle against fraud.

How to Hack a Human: Cybersecurity for the Mind (Paperback): Raef Meeuwisse How to Hack a Human: Cybersecurity for the Mind (Paperback)
Raef Meeuwisse
R543 Discovery Miles 5 430 Ships in 10 - 15 working days
Hacking Wireless Access Points - Cracking, Tracking, and Signal Jacking (Paperback): Jennifer Ann Kurtz Hacking Wireless Access Points - Cracking, Tracking, and Signal Jacking (Paperback)
Jennifer Ann Kurtz
R993 Discovery Miles 9 930 Ships in 12 - 17 working days

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R736 Discovery Miles 7 360 Ships in 12 - 17 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback): Jasper van Woudenberg, Colin... The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback)
Jasper van Woudenberg, Colin O'flynn
R1,049 Discovery Miles 10 490 Ships in 12 - 17 working days

The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

The Basics of Web Hacking - Tools and Techniques to Attack the Web (Paperback, New): Josh Pauli The Basics of Web Hacking - Tools and Techniques to Attack the Web (Paperback, New)
Josh Pauli
R618 R515 Discovery Miles 5 150 Save R103 (17%) Ships in 12 - 17 working days

"The Basics of Web Hacking" introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities.

"The Basics of Web Hacking "provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user.

With Dr. Pauli s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.
Provides a simple and clean approach to Web hacking, including hands-on examples and exercises that are designed to teach you how to hack the server, hack the Web app, and hack the Web user Covers the most significant new tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more Written by an author who works in the field as a penetration tester and who teaches Web security classes at Dakota State University"

Hacking Web Apps - Detecting and Preventing Web Application Security Problems (Paperback): Mike Shema Hacking Web Apps - Detecting and Preventing Web Application Security Problems (Paperback)
Mike Shema
R1,062 R845 Discovery Miles 8 450 Save R217 (20%) Ships in 12 - 17 working days

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read "Hacking Web Apps." The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

SQL Injection

Cross Site Scripting

Logic Attacks

Server Misconfigurations

Predictable Pages

Web of Distrust

Breaking Authentication Schemes

HTML5 Security Breaches

Attacks on Mobile Apps

Even if you don t develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, "Hacking Web Apps" gives you detailed steps to make the web browser - sometimes your last line of defense - more secure.
More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more."

Seven Deadliest Unified Communications Attacks (Paperback): Dan York Seven Deadliest Unified Communications Attacks (Paperback)
Dan York
R571 R424 Discovery Miles 4 240 Save R147 (26%) Ships in 12 - 17 working days

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability. This book will be of interest to information security professionals of all levels as well as recreational hackers.

Seven Deadliest Wireless Technologies Attacks (Paperback): Brad Haines Seven Deadliest Wireless Technologies Attacks (Paperback)
Brad Haines
R561 R434 Discovery Miles 4 340 Save R127 (23%) Ships in 12 - 17 working days

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

A Guide to Kernel Exploitation - Attacking the Core (Paperback): Enrico Perla, Massimiliano Oldani A Guide to Kernel Exploitation - Attacking the Core (Paperback)
Enrico Perla, Massimiliano Oldani
R1,106 R860 Discovery Miles 8 600 Save R246 (22%) Ships in 12 - 17 working days

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
Covers a range of operating system families - UNIX derivatives, Mac OS X, WindowsDetails common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditionsDelivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

Hacker's Delight (Hardcover, 2nd edition): Henry Warren Hacker's Delight (Hardcover, 2nd edition)
Henry Warren
R1,319 R1,144 Discovery Miles 11 440 Save R175 (13%) Ships in 9 - 15 working days

In "Hacker's Delight, Second Edition," Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren's hacks are eminently practical, but they're also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.
Extensive additions in this edition include A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code A new chapter on error correcting codes (ECC), including routines for the Hamming code More coverage of integer division by constants, including methods using only shifts and adds Computing remainders without computing a quotient More coverage of population count and counting leading zeros Array population count New algorithms for compress and expand An LRU algorithm Floating-point to/from integer conversions Approximate floating-point reciprocal square root routine A gallery of graphs of discrete functions Now with exercises and answers

The SME Business Guide to Fraud Risk Management (Paperback): Robert James Chapman The SME Business Guide to Fraud Risk Management (Paperback)
Robert James Chapman
R967 R616 Discovery Miles 6 160 Save R351 (36%) Ships in 9 - 15 working days

* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events.

IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,243 Discovery Miles 22 430 Ships in 12 - 17 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition): Mike Shema Anti-Hacker Tool Kit, Fourth Edition (Paperback, 4th edition)
Mike Shema
R1,411 R1,149 Discovery Miles 11 490 Save R262 (19%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Defend against today's most devious attacksFully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustratedby code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback): Thomas J.... Cybercrime and Criminological Theory - Fundamental Readings on Hacking, Piracy, Theft, and Harassment (Paperback)
Thomas J. Holt
R4,797 Discovery Miles 47 970 Ships in 10 - 15 working days

Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and those victimized by it. The anthology "Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment" explores the predictors for participation in various forms of cybercrime and deviance, from common problems like media piracy, to more distinct offenses such as computer hacking. Most criminological theories were developed to account for street crimes, so it is unclear how these theories may apply to virtual offending. This text provides critical insight into the utility of multiple theories to account for cybercrimes.
"Cybercrime and Criminological Theory" gives direct insight into the rates and prevalence of cybercrime offenses using data sets from populations across the United States. It gives readers a fundamental understanding of, and appreciation for various forms of cybercrime, and outlines prospective predictors of both offending and victimization. The selected readings identify research questions that must be addressed in order to improve the legal, technical, and policy responses to cybercrimes.
"Cybercrime and Criminological Theory" begins with an introduction to cybercrime and virtual criminality. From there, the book offers five sections featuring seminal and cutting edge works on topics in:
- Routine Activities Theory
- Deterrence Theory
- Social Learning and Self Control
- General Strain Theory
- Deviant Subcultures
The book uses articles and cutting-edge research in the field to create a text that is relevant for students at all levels of study, as well as scholars in criminology, sociology, and information security. Undergraduate students will gain insight into the value of various theories to account for victimization and offending, and learn basic research methods applied by criminologists to assess crime and victimization. Graduate students benefit from the detail provided on research methods, measurement, and research questions that must be addressed to fully understand cybercrimes.
Thomas J. Holt earned his Ph.D. at the University of Missouri, Saint Louis. He is currently an Associate Professor in the School of Criminal Justice at Michigan State University. His areas of research include computer hacking, malware, and the role played by technology and computer-mediated communications in facilitating crime and deviance. Dr. Holt is the co-author of "Digital Crime and Digital Terror," and the co-editor of "Corporate Hacking and Technology-Driven Crime." He is also the editor of the book "Cybercrime: Causes, Correlates, and Context." His work has also been published in numerous academic journals, including "Crime and Delinquency," "Deviant Behavior," and the "Journal of Criminal Justice." Dr. Holt received two grants from the U.S. National Institute of Justice to examine the market for malicious software, and the social dynamics of carders and on-line data thieves. Additionally, he is the project lead for the Spartan Devils Chapter of the Honeynet Project, and directs the MSU Open Source Research Laboratory, which explores cyber threats around the globe through on-line research.

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R1,019 R947 Discovery Miles 9 470 Save R72 (7%) Ships in 12 - 17 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Hacking - The Art Of Exploitation (Paperback, 2nd Revised edition): Jon Erickson Hacking - The Art Of Exploitation (Paperback, 2nd Revised edition)
Jon Erickson 1
R1,242 R930 Discovery Miles 9 300 Save R312 (25%) Ships in 10 - 15 working days

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, ex

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R1,053 R663 Discovery Miles 6 630 Save R390 (37%) Ships in 12 - 17 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

Computers Under Attack - Intruders, Worms and Viruses (Paperback, New): Peter Denning Computers Under Attack - Intruders, Worms and Viruses (Paperback, New)
Peter Denning
R1,060 Discovery Miles 10 600 Ships in 10 - 15 working days

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The fifth part of the book gives a glimpse of the worlds in which hackers live. The final part deals with the social context in which people make ethical and moral interpretations and propose new laws.

Hacker's Challenge 3 (Paperback, 3rd edition): David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi Hacker's Challenge 3 (Paperback, 3rd edition)
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi
R1,685 R1,329 Discovery Miles 13 290 Save R356 (21%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Digital Forensics II
Martin S Olivier, Sujeet Shenoi Hardcover R3,012 Discovery Miles 30 120
Computer and Intrusion Forensics
George Mohay, Alison Anderson, … Hardcover R2,717 Discovery Miles 27 170
Masters of Deception: the Gang That…
Michele Slatalla Paperback R436 R364 Discovery Miles 3 640
Permanent Record
Edward Snowden Paperback  (1)
R368 Discovery Miles 3 680
Malware Analysis Using Artificial…
Mark Stamp, Mamoun Alazab, … Hardcover R4,951 Discovery Miles 49 510
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R479 Discovery Miles 4 790
Data Science in Cybersecurity and…
Leslie F Sikos, Kim-Kwang Raymond Choo Hardcover R4,897 Discovery Miles 48 970
Game Over Girl
Naomi Gibson Paperback R202 Discovery Miles 2 020
Cyber Denial, Deception and Counter…
Kristin E. Heckman, Frank J Stech, … Hardcover R3,505 R2,386 Discovery Miles 23 860
Cybersecurity, Privacy and Freedom…
Hamid Jahankhani, Arshad Jamal, … Hardcover R1,554 Discovery Miles 15 540

 

Partners