0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (29)
  • R500+ (297)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Computers Under Attack - Intruders, Worms and Viruses (Paperback, New): Peter Denning Computers Under Attack - Intruders, Worms and Viruses (Paperback, New)
Peter Denning
R1,021 Discovery Miles 10 210 Ships in 18 - 22 working days

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The fifth part of the book gives a glimpse of the worlds in which hackers live. The final part deals with the social context in which people make ethical and moral interpretations and propose new laws.

Democracy Hacked - Political Turmoil and Information Warfare in the Digital Age (Hardcover): Martin Moore Democracy Hacked - Political Turmoil and Information Warfare in the Digital Age (Hardcover)
Martin Moore 1
R578 Discovery Miles 5 780 Ships in 10 - 15 working days

In the space of one election cycle, authoritarian governments, moneyed elites and fringe hackers figured out how to game elections, bypass democratic processes, and turn social networks into battlefields. Facebook, Google and Twitter - where our politics now takes place - have lost control and are struggling to claw it back. Prepare for a new strain of democracy. A world of datafied citizens, real-time surveillance, enforced wellness and pre-crime. Where switching your mobile platform will have more impact on your life than switching your government. Where freedom and privacy are seen as incompatible with social wellbeing and compulsory transparency. As our lives migrate online, we have become increasingly vulnerable to digital platforms founded on selling your attention to the highest bidder. Our laws don't cover what is happening and our politicians don't understand it. But if we don't change the system now, we may not get another chance.

Hacker's Challenge 3 (Paperback, 3rd edition): David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi Hacker's Challenge 3 (Paperback, 3rd edition)
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi
R1,552 R1,275 Discovery Miles 12 750 Save R277 (18%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.

Cybercrime Prevention - Theory and Applications (Hardcover, 1st ed. 2019): Russell Brewer, Melissa De Vel-Palumbo, Alice... Cybercrime Prevention - Theory and Applications (Hardcover, 1st ed. 2019)
Russell Brewer, Melissa De Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, …
R1,887 R1,603 Discovery Miles 16 030 Save R284 (15%) Ships in 10 - 15 working days

This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an overview of the key principles, concepts and research literature associated with crime prevention, and discusses the interventions most commonly applied to crime problems. The authors review the theoretical underpinnings of these and analyses evidence for their efficacy. Cybercrime Prevention is split into three sections which examine primary prevention, secondary prevention and tertiary prevention. It provides a thorough discussion of what works and what does not, and offers a formulaic account of how traditional crime prevention interventions can be reimagined to apply to the digital realm.

Game Over Girl (Paperback): Naomi Gibson Game Over Girl (Paperback)
Naomi Gibson
R263 R240 Discovery Miles 2 400 Save R23 (9%) Ships in 9 - 17 working days

An edge-of-your-seat psychological thriller from the acclaimed author of Every Line of You - A Good Girl's Guide to Murder meets virtual reality ... 'A pacy, intelligent novel that will have readers racing to get to the final page.' THE BOOKSELLER 'A pixelated whirlwind of a ride through the darkest secrets of the human mind, explored through the lens of virtual reality gaming!' LEE NEWBERY, AUTHOR OF THE LAST FIREFOX Lola's been selected to play a new virtual reality game - Better Than Life. In her game, she's loved. Is beautiful. Can do whatever she wants. But she quickly breaks the one rule: not to recreate people or places from real life. She recreates her house and a boy she fancies. Soon she's skipping school to play. But Lola has secrets - dark ones that begin to surface inside her game - and the more she tries to fix her problems, the more she overlooks a much bigger threat ... An original, high-concept psychological thriller - Holly Jackson meets VR horror Set in an exclusive boarding school, this rollercoaster ride of a story involves an unreliable narrator,immersive gaming, a dark secret and a huge twist Perfect for fans of Cynthia Murphy and Kathryn Foxfield PRAISE FOR EVERY LINE OF YOU: 'What a debut. So tense - and it didn't lead where I thought it was going.' SUE WALLMAN, author of YOUR TURN TO DIE 'Frankenstein meets Heathers. Bonnie and Clyde for the digital age, Every Line of You is a gripping thriller about the power of AI and a fresh twist on the intensity of first love.' AMY MCCAW, author of MINA AND THE UNDEAD

Computer Forensics JumpStart 2e (Paperback, 2nd Edition): Mg Solomon Computer Forensics JumpStart 2e (Paperback, 2nd Edition)
Mg Solomon
R697 R626 Discovery Miles 6 260 Save R71 (10%) Ships in 18 - 22 working days

Essential reading for launching a career in computer forensics

Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crimeDetails the ways to conduct a computer forensics investigationHighlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witnessWalks you through identifying, collecting, and preserving computer evidenceExplains how to understand encryption and examine encryption files

"Computer Forensics JumpStart" is the resource you need to launch a career in computer forensics.

Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback): Occupytheweb Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback)
Occupytheweb
R844 Discovery Miles 8 440 Ships in 10 - 15 working days

Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you'll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide - Keep up to date with ethical hacking trends and hone your skills with... Certified Ethical Hacker (CEH) v11 312-50 Exam Guide - Keep up to date with ethical hacking trends and hone your skills with hands-on activities (Paperback)
Dale Meredith, Christopher Rees
R1,311 Discovery Miles 13 110 Ships in 18 - 22 working days

Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is forThis ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.

Claim Denied (Paperback): DiAnn Schindler Claim Denied (Paperback)
DiAnn Schindler
R442 Discovery Miles 4 420 Ships in 18 - 22 working days
Satan's Gold - Money makes the world go 'round. Or stop. (Paperback): Michael Ray Ewing Satan's Gold - Money makes the world go 'round. Or stop. (Paperback)
Michael Ray Ewing
R493 Discovery Miles 4 930 Ships in 18 - 22 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
Hot Roll - Large Print (Caught Dead In Wyoming, Book 8) (Large print, Paperback, Large type / large print edition): Patricia... Hot Roll - Large Print (Caught Dead In Wyoming, Book 8) (Large print, Paperback, Large type / large print edition)
Patricia McLinn
R656 R610 Discovery Miles 6 100 Save R46 (7%) Ships in 18 - 22 working days
Back Story - Large Print (Caught Dead In Wyoming, Book 6) (Large print, Paperback, Large type / large print edition): Patricia... Back Story - Large Print (Caught Dead In Wyoming, Book 6) (Large print, Paperback, Large type / large print edition)
Patricia McLinn
R654 R608 Discovery Miles 6 080 Save R46 (7%) Ships in 18 - 22 working days
Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware... Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware attacks (Paperback)
Jean-Georges Valle
R1,316 Discovery Miles 13 160 Ships in 18 - 22 working days

Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is forIf you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters.

At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback): Stephen Timm At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback)
Stephen Timm
R385 R166 Discovery Miles 1 660 Save R219 (57%) In Stock

Eran Eyal had it all: a trendy New York apartment, a jet-set lifestyle and investors lining up to get in on his million-dollar cryptocurrency start-up, Shopin. He had come a long way from an ordinary middle-class childhood in Durban and the burgeoning tech start-up world of Cape Town.

But the New York authorities pounced in 2018, charged him with fraud and packed him off to Rikers Island. There began the gobsmacking unravelling of a scam that spanned investors across the globe and revealed that Eyal had built a house of cards involving fictitious products, clients and advisors for Shopin and his previous company, Springleap. As more than $40 million went up in smoke, the South African entrepreneur was exposed as an audacious fraudster determined to succeed at any cost – even if it meant spinning a web of  lies to do so.

“An age-old narrative about ego and flying too close to the sun as well as a modern version of greed in the tech world.” Michael Jordaan

“Eyal proves definitively that a thousand white lies can get you convicted of fraud. This book meticulously walks the reader though the start-up lies that ended in tears.” Nic Haralambous

Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition... Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition (Paperback, 3rd Revised edition)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari
R1,335 Discovery Miles 13 350 Ships in 18 - 22 working days

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Key Features Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Book DescriptionWeb Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. What you will learn Learn how to set up your lab with Kali Linux Understand the core concepts of web penetration testing Get to know the tools and techniques you need to use with Kali Linux Identify the difference between hacking a web application and network hacking Expose vulnerabilities present in web servers and their applications using server-side attacks Understand the different techniques used to identify the flavor of web applications See standard attacks such as exploiting cross-site request forgery and cross-site scripting flaws Get an overview of the art of client-side attacks Explore automated attacks such as fuzzing web applications Who this book is forSince this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must.

Your Safety and Privacy Online - The CIA and NSA (Paperback): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Paperback)
Siggi Bjarnason
R289 R274 Discovery Miles 2 740 Save R15 (5%) Ships in 18 - 22 working days
How to Hack a Human: Cybersecurity for the Mind (Paperback): Raef Meeuwisse How to Hack a Human: Cybersecurity for the Mind (Paperback)
Raef Meeuwisse
R545 Discovery Miles 5 450 Ships in 18 - 22 working days
Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,146 Discovery Miles 11 460 Ships in 18 - 22 working days
The Car Hacker's Handbook (Paperback): Craig Smith The Car Hacker's Handbook (Paperback)
Craig Smith
R1,281 R822 Discovery Miles 8 220 Save R459 (36%) Ships in 10 - 15 working days

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven t kept pace with today s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle s communication network, you ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker s Handbook will show you how to: Build an accurate threat model for

Hacking Exposed 7 (Paperback, 7th edition): Stuart McClure, Joel Scambray, George Kurtz Hacking Exposed 7 (Paperback, 7th edition)
Stuart McClure, Joel Scambray, George Kurtz
R1,453 R1,226 Discovery Miles 12 260 Save R227 (16%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself

Cyber Crimes - History of World's Worst Cyber Attacks (Paperback): Vannesa Pitts Cyber Crimes - History of World's Worst Cyber Attacks (Paperback)
Vannesa Pitts
R425 Discovery Miles 4 250 Ships in 18 - 22 working days
Cybersecurity Exposed: The Cyber House Rules (Paperback): Raef Meeuwisse Cybersecurity Exposed: The Cyber House Rules (Paperback)
Raef Meeuwisse
R416 Discovery Miles 4 160 Ships in 9 - 17 working days
Cybersecurity: Home and Small Business (Paperback): Raef Meeuwisse Cybersecurity: Home and Small Business (Paperback)
Raef Meeuwisse
R318 Discovery Miles 3 180 Ships in 18 - 22 working days
Binary Bullets - The Ethics of Cyberwarfare (Paperback): Fritz Allhoff, Adam Henschke, Bradley Jay Strawser Binary Bullets - The Ethics of Cyberwarfare (Paperback)
Fritz Allhoff, Adam Henschke, Bradley Jay Strawser
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain " of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Axiomatic Design - Advances and…
Nam P Suh Hardcover R5,972 Discovery Miles 59 720
Application-layer Fault-tolerance…
Vincenzo De Florio Hardcover R4,181 Discovery Miles 41 810
Power Aware Computing
Robert Graybill, Rami Melhem Hardcover R5,454 Discovery Miles 54 540
Communication and Computing for…
Guojun Lu Hardcover R3,536 Discovery Miles 35 360
System Level Hardware/Software Co-Design…
Joris Van Den Hurk, Jochen A. G Jess Hardcover R4,026 Discovery Miles 40 260
Advances in Hardware Design and…
Hon Li, David Probst Hardcover R4,183 Discovery Miles 41 830
Memory Design Techniques for Low Energy…
Alberto Macii, Luca Benini, … Hardcover R2,732 Discovery Miles 27 320
Principles of Performance and…
Lance Fiondella, Antonio Puliafito Hardcover R5,274 Discovery Miles 52 740
Advances in Information Systems…
Gabor Magyar, Gabor Knapp, … Hardcover R5,449 Discovery Miles 54 490
Implementing Data Analytics and…
Chintan Bhatt, Neeraj Kumar, … Hardcover R5,931 Discovery Miles 59 310

 

Partners